News

Cybercriminals have started abusing legitimate AWS S3 features to encrypt victim buckets in a unique twist to the old ransomware attack.
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the ...
Customers of the cloud giant's hybrid IT service can now use S3 as if it were operating out of a regular AWS region.
There are any number of reasons why it might be useful to compile an inventory report of an S3 bucket on the AWS cloud. For starters, knowing what is in a bucket can help you to better manage data ...
Here's a quick refresher on how JSON files work and how you can use them to configure AWS services. Normally, I like to use my articles on this site to show you how to accomplish various tasks in an ...