ITculate Not Affected by SAML Vulnerabilities Identified by Duo Security

On February 27, 2018, Duo Security announced the discovery of a new class of vulnerability affecting SAML-based single sign-on systems. This flaw can allow an authenticated attacker to fool SAML systems into logging in as a different user, even without … Continue Reading

Meltdown and Spectre

Meltdown and Spectre Recently two CPU microarchitecture vulnerabilities were discovered by Google’s Project Zero team and independently by other researchers: Meltdown and Spectre, which affect most modern computing devices. Both attacks involve speculative-execution side-channels. The Meltdown vulnerability, CVE-2017-5754, can potentially … Continue Reading

How to Optimize and Visualize Your Security Groups (Jump Host example)

In this post we review how to understand and visualize AWS security groups, and how to use it for identifing security vulnerabilities. What are AWS Security Groups? AWS Security Groups acts as a virtual firewall for your instance to control inbound and outbound … Continue Reading

Who is accessing your Elastic File System (EFS)?

In this post we review how to understand and visualize who is accessing your EFS, and how to use it for troubleshooting, cost allocation and system design. What is Elastic File System (EFS)? Amazon Elastic File System (Amazon EFS) provides … Continue Reading

Who is accessing your data(base)?

Who is accessing my database ??

Here is a deceptively simple question: who is accessing my database (or data)? Who accessed it in the recent three days? That sounds like something that is reasonable to ask and to get an answer for. However in reality, this … Continue Reading

Using VPC Flow Logs to visualize your network

AWS VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data is is a part of the Amazon CloudWatch Logs. After you’ve … Continue Reading