Automating IP Blocking on Cloudflare with a Slack BotIn the world of web security, time is of the essence. Manually blocking suspicious IP addresses on Cloudflare via the UI can be a tedious…Feb 7, 2024Feb 7, 2024
Leveraging CloudWatch Synthetics for Proactive Incident ResponseAmazon CloudWatch Synthetics enables the creation of canaries — configurable scripts scheduled to run and monitor endpoints and APIs…Jan 14, 2024Jan 14, 2024
Deploying Jenkins using AWS CDK and TypescriptIn today’s fast-paced software development world, continuous integration and continuous deployment (CI/CD) have become essential practices…Jul 20, 2023Jul 20, 2023
AWS Config, Cloud Custodian, or Both?By the end of this blog, you will understand the similarities and differences between AWS Config and Cloud Custodian, allowing you to…Jan 4, 20231Jan 4, 20231
Deploying applications to ECS Fargate with AWS CDK and TypescriptYou will learn how to deploy VPC, CDN, ALB, and ECS Fargate in this blog.Oct 2, 20221Oct 2, 20221
Exploiting CVE-2019–5418- File Content Disclosure on RailsIn Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1, and v3, a File Content Disclosure vulnerability exists where properly designed…Feb 13, 2022Feb 13, 2022
NCIIPC — Responsible Vulnerability Disclosure ProgramNCIIPC stands for National Critical Information Infrastructure Protection Center.Sep 3, 20213Sep 3, 20213