• Content by: Ayesha Noor Arshad

Understanding and Mitigating the LeakyCLI Vulnerability: AWS, GCP and Azure

Introduction to the LeakyCLI Vulnerability The LeakyCLI vulnerability identified by Orca Security is a critical issue found in the CLI tools of major cloud providers like AWS, Google Cloud, and Azure. This flaw allows sensitive credentials to be exposed in build logs, thereby increasing the risk of security breaches. Azure has fixed the vulnerability, whereas, AWS and GCP have given […]

An Efficient way to Deploy your Code to Amazon EC2

The ways of the monolith deployments require Application teams to deploy their code on AWS Elastic Compute Cloud almost every day. With an increasing focus on automation luckily now we have tools to automate this boring procedure as well. Hence in this article, I will be discussing a less effective old way of deploying code on AWS EC2 instances and […]

error: Content is protected. You are automatically reported to the Authorities!