muenchen.social ist Teil des dezentralen sozialen Netzwerks, das von Mastodon betrieben wird.
Hallo auf muenchen.social Dies ist eine deutschsprachige Mastodon Instanz für München zum tröten, neue Leute kennenlernen, sich auszutauschen und Spass zu haben.

Verwaltet von:

Serverstatistiken:

1,3 Tsd
aktive Profile

Mehr erfahren

The New Oil<p>Hackers target <a href="https://mastodon.thenewoil.org/tags/SSRF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSRF</span></a> bugs in <a href="https://mastodon.thenewoil.org/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a>-hosted sites to steal <a href="https://mastodon.thenewoil.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> credentials</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
lud<p><span class="h-card"><a href="https://social.tchncs.de/@Marcel_Gehlen" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Marcel_Gehlen</span></a></span> dann wollen wir, Deinen Hinweis einen groesseren Kreis kundtun. Wie das so geht, kennst Du sicher. </p><p>Macht den <a href="https://social.tchncs.de/tags/eXit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eXit</span></a> und den <a href="https://social.tchncs.de/tags/UnplugTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnplugTrump</span></a> , d.h. u.a. verlasst die <a href="https://social.tchncs.de/tags/usServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usServer</span></a> der <a href="https://social.tchncs.de/tags/TechMillardaere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechMillardaere</span></a> , wie z.B. <a href="https://social.tchncs.de/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> , <a href="https://social.tchncs.de/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://social.tchncs.de/tags/icloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>icloud</span></a> , <a href="https://social.tchncs.de/tags/MicroSoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicroSoft</span></a> <a href="https://social.tchncs.de/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> , <a href="https://social.tchncs.de/tags/akamai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>akamai</span></a> , <a href="https://social.tchncs.de/tags/googleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleCloud</span></a> . Es gibt viele gute <a href="https://social.tchncs.de/tags/europeanAlternatives" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europeanAlternatives</span></a> und einige bedenkliche <a href="https://social.tchncs.de/tags/euServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>euServer</span></a> wie solche die AfD-Inhalte hosten : <a href="https://social.tchncs.de/tags/hetzner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hetzner</span></a> wurde da genannt. Wer dort ist, sollte vielleicht mal nachdenken und -fragen.</p>
Kal Feher<p>price reductions are good. but the drop in AUD to USD means this isnt a reduction for me at all. Also note that S3 E1Z is not found in many AWS regions.</p><p><a href="https://aws.amazon.com/blogs/aws/up-to-85-price-reductions-for-amazon-s3-express-one-zone/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/blogs/aws/up-to</span><span class="invisible">-85-price-reductions-for-amazon-s3-express-one-zone/</span></a><br><a href="https://infosec.exchange/tags/aus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aus</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/s3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>s3</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> rolls out <a href="https://mastodon.thenewoil.org/tags/MLKEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MLKEM</span></a> to secure <a href="https://mastodon.thenewoil.org/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> from <a href="https://mastodon.thenewoil.org/tags/quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantum</span></a> threats</p><p><a href="https://www.bleepingcomputer.com/news/security/aws-rolls-out-ml-kem-to-secure-tls-from-quantum-threats/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/aws-rolls-out-ml-kem-to-secure-tls-from-quantum-threats/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybesecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a></p>
UK<p><a href="https://www.europesays.com/uk/6968/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/6968/</span><span class="invisible"></span></a> QCon London: Mistakes People Make Building SaaS Software <a href="https://pubeurope.com/tags/Arts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arts</span></a> <a href="https://pubeurope.com/tags/ArtsAndDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtsAndDesign</span></a> <a href="https://pubeurope.com/tags/AutomatedDeployment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutomatedDeployment</span></a> <a href="https://pubeurope.com/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://pubeurope.com/tags/Culture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Culture</span></a>&amp;Methods <a href="https://pubeurope.com/tags/Design" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Design</span></a> <a href="https://pubeurope.com/tags/Entertainment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entertainment</span></a> <a href="https://pubeurope.com/tags/QConLondon2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QConLondon2025</span></a> <a href="https://pubeurope.com/tags/QconSaasSoftwareMistakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QconSaasSoftwareMistakes</span></a> <a href="https://pubeurope.com/tags/SaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaaS</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedKingdom</span></a></p>
Kal Feher<p>sitting through a <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> well architected session can be a real chore. </p><p>But the advice is generally a good place to start. Esp in domains where your team might have low proficiency. <br>so the updated advice is def worth a read. </p><p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/new-guidance-well-architected-tool" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/new-guidance-well-architected-tool</span></a></p>
Shaun Hills<p>Say what you want about <a href="https://mastodon.nz/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> but the knowledge &amp; communication skills of their support staff are top notch. Most of the rest of the industry could learn a thing or two.</p>
LavX News<p>Exploiting SSRF Vulnerabilities: A New Threat to AWS EC2 Instances</p><p>A recent surge in targeted attacks has revealed a critical vulnerability in AWS EC2 instances, allowing hackers to exploit Server-Side Request Forgery (SSRF) flaws. This campaign not only highlights t...</p><p><a href="https://news.lavx.hu/article/exploiting-ssrf-vulnerabilities-a-new-threat-to-aws-ec2-instances" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/exploitin</span><span class="invisible">g-ssrf-vulnerabilities-a-new-threat-to-aws-ec2-instances</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.cloud/tags/SSRF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSRF</span></a> <a href="https://mastodon.cloud/tags/IMDSv2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMDSv2</span></a></p>
Walker<p>Sigh. Amazon AWS Glacier is great for long term storage. I just wish there was an easier way to delete old vaults. </p><p>I understand the process, but it is still a pain to log into AWS, retrieve the inventory list, select the files to delete, then able to delete the old vault. A large vault will take a while to retrieve the inventory. Not a quick process. </p><p>Not a simple or quick process. I wish there was a nuke vault button that would take care of this.</p><p><a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/glacier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glacier</span></a> <a href="https://infosec.exchange/tags/amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amazon</span></a></p>
Kacper Bak<p><span class="h-card"><a href="https://mastodon.social/@Erklaerbaer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Erklaerbaer</span></a></span> <span class="h-card"><a href="https://social.tchncs.de/@kuketzblog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kuketzblog</span></a></span> Danke für den Artikel, dieser fasst die Herausforderungen im <a href="https://fosstodon.org/tags/SovereignCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SovereignCloud</span></a> Bereich wirklich gut und belegt zusammen. <a href="https://fosstodon.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> will bis Ende 2025 eine vollständig autonome Region in Deutschland anbieten. Ich bin gespannt auf das Ergebnis, ist nicht der erste Hyperscaler der so etwas in DE versucht. Die Service-Auswahl sieht schon mal gut aus: <a href="https://aws.amazon.com/blogs/security/announcing-initial-services-available-in-the-aws-european-sovereign-cloud-backed-by-the-full-power-of-aws/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/blogs/security/</span><span class="invisible">announcing-initial-services-available-in-the-aws-european-sovereign-cloud-backed-by-the-full-power-of-aws/</span></a></p>
Mijndert<p>Wouldn't it be nice to be able to go "I'll have the same RDS reserved instances again please" in <a href="https://fosstodon.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>? Such a massive time sink to figure out 1. what you need and 2. what the discount will be per purchase option.</p>
Merle Meyerdierks<p>Besser gleich zu Threema! Der Traffic von <a class="hashtag" href="https://bsky.app/search?q=%23Signal" rel="nofollow noopener noreferrer" target="_blank">#Signal</a> geht über die US Clouds v. <a class="hashtag" href="https://bsky.app/search?q=%23Google" rel="nofollow noopener noreferrer" target="_blank">#Google</a>, <a class="hashtag" href="https://bsky.app/search?q=%23Amazon" rel="nofollow noopener noreferrer" target="_blank">#Amazon</a> <a class="hashtag" href="https://bsky.app/search?q=%23AWS" rel="nofollow noopener noreferrer" target="_blank">#AWS</a> <a class="hashtag" href="https://bsky.app/search?q=%23Microsoft" rel="nofollow noopener noreferrer" target="_blank">#Microsoft</a> <a class="hashtag" href="https://bsky.app/search?q=%23Azure" rel="nofollow noopener noreferrer" target="_blank">#Azure</a> &amp; <a class="hashtag" href="https://bsky.app/search?q=%23Cloudflare" rel="nofollow noopener noreferrer" target="_blank">#Cloudflare</a> = alles absolute No-Go´s Und US Dienste können über den US CloudAct direkt darauf zugreifen! <a href="https://de.wikipedia.org/wiki/CLOUD_Act" rel="nofollow noopener noreferrer" target="_blank">de.wikipedia.org/wiki/CLOUD_Act</a> <a class="hashtag" href="https://bsky.app/search?q=%23SignalApp" rel="nofollow noopener noreferrer" target="_blank">#SignalApp</a> ist nicht anonym = <a class="hashtag" href="https://bsky.app/search?q=%23Threema" rel="nofollow noopener noreferrer" target="_blank">#Threema</a> ja<br><br><a href="https://de.wikipedia.org/wiki/CLOUD_Act" rel="nofollow noopener noreferrer" target="_blank">CLOUD Act – Wikipedia</a></p>
Victor Grenu<p>Joke aside, what kind of guardrails are you using to prevent Denial of Wallet (DoW) and lack of visibility on billed cloud assets?</p><p><a href="https://infosec.exchange/tags/AWSSummit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWSSummit</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a></p>
diesUndDasMitTassen 🇺🇦<p>Nach langer Suche habe ich endlich S3 cloudstorage Client Software gefunden, die macht, was ich brauche.</p><p>Für Linux ist es <a href="https://mastodon.social/tags/rclone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rclone</span></a> mit dem rclone browser und für grapheneOS ist es <a href="https://mastodon.social/tags/exfilac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exfilac</span></a>.</p><p>Hauptproblem mit anderer Software war die Konfiguration des Zugriffs auf alternative storage Anbieter (statt <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>). Bei den beiden Tools funktioniert es. Für Linux würde ich mir wünschen, daß <a href="https://mastodon.social/tags/beyondcompare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>beyondcompare</span></a> endlich alternative S3 storage Anbieter unterstützt 🤨</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://mastodon.social/tags/s3storage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>s3storage</span></a> <a href="https://mastodon.social/tags/cloudstorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudstorage</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a></p>
Tim Bray<p>If you care about <a href="https://cosocial.ca/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>, this from <span class="h-card"><a href="https://awscommunity.social/@Quinnypig" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Quinnypig</span></a></span> is a big deal: <a href="https://www.duckbillgroup.com/blog/ec2-reserved-instances-are-being-deprecated/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">duckbillgroup.com/blog/ec2-res</span><span class="invisible">erved-instances-are-being-deprecated/</span></a></p><p>Tl;dr: Reserved Instances are being quietly deprecated .</p>
0x40k<p>Whoa, just caught wind of this nasty Amazon EC2 SSM Agent vulnerability... seriously concerning stuff! We're talking Privilege Escalation and even Remote Code Execution just by manipulating Plugin IDs? Sounds like a *major* headache for admins. 😬</p><p>You know how the SSM Agent is pretty much the command center for your EC2 instances? Well, if *that* gets compromised, it's basically game over. 🙈 Turns out, the issue stems from faulty validation of those Plugin IDs – a classic vulnerability pattern, really. Attackers can actually manipulate paths using '../', something we pentesters unfortunately see pop up more often than you'd think.</p><p>It's the kind of sneaky flaw that automated vulnerability scanners frequently miss, which really highlights why manual testing is still invaluable! ✨</p><p>So, the bottom line? Updating to version **3.3.1957.0** isn't just recommended, it's pretty much essential right now. Also, definitely take a good look through your SSM docs for any fishy-looking Plugin IDs, just to be safe.</p><p>Speaking of keeping things locked down, what are your go-to tools or strategies for hardening your AWS environment? Always curious to hear what others are doing! 🤔</p><p><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p>
Chum1ng0 - Security Research :verified:<p>Documents revealing personal data were exposed. This was reported to the Finnish entity, but I never received a response from them.</p><p>As a result, I had to contact the National Cyber Security Centre of Finland (NCSC-FI) twice to get them to close the case.</p><p><a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/bucket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bucket</span></a></p>
Kyler Middleton<p>🚀 Part 9 of Building a Slack Bot with AI is live!</p><p>We wrap the series by solving a big problem: Slack needs fast responses, but our AI Lambda takes time. The fix? A Receiver Lambda that immediately replies to Slack, then hands off the work.</p><p>Clean, async, and cost-effective.</p><p>Catch the final post here:<br><a href="https://www.letsdodevops.com/p/building-a-slack-bot-receiver" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">letsdodevops.com/p/building-a-</span><span class="invisible">slack-bot-receiver</span></a></p><p><a href="https://infosec.exchange/tags/Serverless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Serverless</span></a> <a href="https://infosec.exchange/tags/Slack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slack</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://infosec.exchange/tags/LetsDoDevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LetsDoDevOps</span></a></p>
Merle Meyerdierks<p>Besser gleich zu Threema! Der Traffic von <a class="hashtag" href="https://bsky.app/search?q=%23Signal" rel="nofollow noopener noreferrer" target="_blank">#Signal</a> geht über die US Clouds v. <a class="hashtag" href="https://bsky.app/search?q=%23Google" rel="nofollow noopener noreferrer" target="_blank">#Google</a>, <a class="hashtag" href="https://bsky.app/search?q=%23Amazon" rel="nofollow noopener noreferrer" target="_blank">#Amazon</a> <a class="hashtag" href="https://bsky.app/search?q=%23AWS" rel="nofollow noopener noreferrer" target="_blank">#AWS</a> <a class="hashtag" href="https://bsky.app/search?q=%23Microsoft" rel="nofollow noopener noreferrer" target="_blank">#Microsoft</a> <a class="hashtag" href="https://bsky.app/search?q=%23Azure" rel="nofollow noopener noreferrer" target="_blank">#Azure</a> &amp; <a class="hashtag" href="https://bsky.app/search?q=%23Cloudflare" rel="nofollow noopener noreferrer" target="_blank">#Cloudflare</a> = alles absolute No-Go´s Und US Dienste können über den US CloudAct direkt darauf zugreifen! <a href="https://de.wikipedia.org/wiki/CLOUD_Act" rel="nofollow noopener noreferrer" target="_blank">de.wikipedia.org/wiki/CLOUD_Act</a></p>
Chum1ng0 - Security Research :verified:<p>🇫🇮 Finland: 105,000 Satula.com Records Exposed in Unsecured AWS.</p><p>🔗 <a href="https://medium.com/@newschu.substack.com/finland-105-000-satula-com-records-exposed-in-unsecured-aws-be7318ca5523" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@newschu.substack.c</span><span class="invisible">om/finland-105-000-satula-com-records-exposed-in-unsecured-aws-be7318ca5523</span></a> </p><p><a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/bucket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bucket</span></a></p>