Mar 03, 2025Ravie LakshmananCloud Security / Email Security Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity company is tracking the activity cluster under the name TGR-UNK-0011 (short for a threat group with unknown motivation), … [Read more...] about Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
aws
The 8 Hidden Pitfalls of Using AWS CloudWatch
AWS CloudWatch is a widely used observability tool that comes built into AWS. It provides easy access to logs, metrics, and alarms, making it a convenient choice for teams monitoring AWS workloads. But while CloudWatch offers a lot of power, many teams unknowingly misconfigure or misuse it, leading to unexpected costs, limited visibility, and operational challenges. Here … [Read more...] about The 8 Hidden Pitfalls of Using AWS CloudWatch
Elastic earns fifth AWS Competency as a Government ISV Partner
Advancing digital transformation in government through Search AI and cloud innovationWe’re thrilled to share that Elastic has achieved the AWS Government ISV Partner Competency. This prestigious designation recognizes Elastic as an Amazon Web Services (AWS) partner that has proven expertise in delivering high-quality solutions that help government agencies meet mandates, reduce … [Read more...] about Elastic earns fifth AWS Competency as a Government ISV Partner
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of … [Read more...] about New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Elastic and AWS in 2024: Celebrating innovation synergy at AWS re:Invent
Last week, more than 60,000 AWS enthusiasts, experts, and practitioners attended the weeklong AWS re:Invent conference in Las Vegas while exploring the latest innovations, networking, and learning from 2,000+ sessions.AWS re:Invent is the tech world's blockbuster event. As a Diamond Sponsor, Elastic was pumped to dive in and connect with IT leaders, customers, and the AWS … [Read more...] about Elastic and AWS in 2024: Celebrating innovation synergy at AWS re:Invent
Announcing Protection for AWS IAM Identity Center
As organizations scale their operations on Amazon Web Services (AWS), they must secure their identities and ensure all users have the correct permissions. AWS IAM Identity Center is built to simplify access management across multiple AWS accounts — a critical tool for rapidly growing AWS environments. This hub for identity data and processes demands strong protection against … [Read more...] about Announcing Protection for AWS IAM Identity Center
CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent
Together, these innovations deliver a unified, proactive approach to protecting cloud environments and providing the full context needed to stay ahead of emerging threats. CrowdStrike Achieves AWS AI Competencies AWS GenAI Competency: CrowdStrike has achieved the AWS Generative AI Competency, distinguishing us as a leader in advancing generative AI solutions that … [Read more...] about CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent
Connect a custom AWS S3 snapshot repository to Elastic Cloud
In this blog, we will walk through backing up our committed cluster data via Elasticsearch’s snapshots into an AWS S3 bucket. In Elastic Cloud (Enterprise), Elastic provides a built-in backup service under its found-snapshots repository. Elasticsearch also supports custom repositories for both Cloud and on-prem setups, connecting to data stores like AWS S3, GCP, and Azure for … [Read more...] about Connect a custom AWS S3 snapshot repository to Elastic Cloud
Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS
Elastic Cloud Hosted deployments that have been encrypted with AWS KMS keys also support AWS KMS key security policies and features, such as key rotation and key revocation. Key rotation minimizes the risk of data leaks due to key compromise. Key revocation is an additional security measure, where access to encrypted data via a compromised key is terminated, either via … [Read more...] about Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS
Cisco Simplifies Cloud Security with AWS Cloud WAN Service Insertion
In conversations with customers about cloud infrastructure, I routinely hear two challenges when it comes to scaling their cloud deployments, these challenges include: Achieving secure connectivity across clouds, virtual private clouds (VPCs), regions, and on-premises networks Ensuring security is baked into the network architecture from the start. As customers grow their … [Read more...] about Cisco Simplifies Cloud Security with AWS Cloud WAN Service Insertion