SHARE KOLEKSI WALLPAPER PART 2

••• A THREAD •••

https://t.co/vettK8txaI
https://t.co/IVbf4RTVUk
https://t.co/J3MlhTBIng
https://t.co/qaWXpsmP2E
https://t.co/qomIlXSnsn
https://t.co/6V5h5KsKXk
https://t.co/A6e5JOF6Ig
https://t.co/Q7YMrKhi3G
https://t.co/YTZdPZu0Rw
https://t.co/xJVcobogk2
https://t.co/A12gxyOmPy
https://t.co/E3Tn9H9SEC
https://t.co/QSZPYZExNY
https://t.co/VXAbnP34Y7
https://t.co/IPtfZK90Yo
https://t.co/5BRZvy6EPM
https://t.co/nXTwIzVtst
https://t.co/x4gTcEOZ6I
https://t.co/9aPj3aS3Tu
https://t.co/mP8WvvyNBr
https://t.co/dVJEdmfSHN
https://t.co/kVdxUceY2C
https://t.co/qi72NVCgLv
https://t.co/5ogOok7bWe
https://t.co/peL0kpatQW
https://t.co/bfRfAhxU4c
https://t.co/g2oQa7Lsyw
https://t.co/qXheFkJkqt
https://t.co/pYnssbDigE
https://t.co/RpljNJiZVq
https://t.co/tkQxLxFy6J
https://t.co/yVbqJzIZcf
https://t.co/A9plnyhDAN
https://t.co/m3WBcFtum1
https://t.co/C6HI5vTUC5
https://t.co/0O48RXVnJ3
https://t.co/xpG8BzIoe6
https://t.co/nqgQGvvGKR
https://t.co/JvZu8pU53G
https://t.co/iB24YYOJLc
https://t.co/pP1DNDUMFe
https://t.co/ol5aKICUwD
https://t.co/hBhpjdxoqA
https://t.co/owxhxBCckM
https://t.co/UcYH8u7vgw
https://t.co/8CtBZw1OCy
https://t.co/LHQo1sV00R
https://t.co/bMGMKm5EYq
https://t.co/sIlXLQ27GK
https://t.co/a0kjJMCaHw
https://t.co/HTMxk6wMcv
https://t.co/cgcNbt4Oju
https://t.co/SYQupx69A7
https://t.co/EgY39QGQ3s
https://t.co/B4OX4bkbAT
https://t.co/DAMCoStMFc
https://t.co/jCRLE3HIEo
https://t.co/AqibyfWu5D
https://t.co/bqLRWEOMFw
https://t.co/HjQmnfbtjC
https://t.co/v3Zi61nS2H
https://t.co/4QplTrUF6k
https://t.co/DtLbv33tbI
https://t.co/q29dwu8EZn
https://t.co/6pzn5tfopC
https://t.co/O7nvgHFOJe
https://t.co/rER84oScKb
https://t.co/I3YpjCVEtu
https://t.co/4sIKSmXxw6
https://t.co/zmm20S3I79
https://t.co/1X3RJApyTH

More from Software

As the year wrap's up, let's run through some of the worst public security mistakes and delays in fixes by AWS in 2020. A thread.

First, that time when an AWS employee posted confidential AWS customer information including including AWS access keys for those customer accounts to


Discovery by @SpenGietz that you can disable CloudTrail without triggering GuardDuty by using cloudtrail:PutEventSelectors to filter all events.


Amazon launched their bug bounty, but specifically excluded AWS, which has no bug bounty.


Repeated, over and over again examples of AWS having no change control over their Managed IAM policies, including the mistaken release of CheesepuffsServiceRolePolicy, AWSServiceRoleForThorInternalDevPolicy, AWSCodeArtifactReadOnlyAccess.json, AmazonCirrusGammaRoleForInstaller.

You May Also Like