Blog

    AWS Security & Cloud Insights

    Practical guides, best practices, and expert insights on AWS security, cloud architecture, and compliance from our team of experienced consultants.

    54 articles published

    AWS Security22 min read

    We Detonated the Real LiteLLM Malware on EC2: Here's What Happened

    We obtained the actual compromised litellm packages, set up a disposable EC2 instance with honeypot credentials and mitmproxy, and detonated the malware. Full evidence: fork bomb, credential theft in under 2 seconds, IMDS queries, AWS API calls, and C2 exfiltration.

    LiteLLMSupply ChainAWS Security
    Read
    AWS Security18 min read

    Anatomy of a Supply Chain Attack: How LiteLLM Was Weaponized in 6 Hours

    A deep technical breakdown of how threat actor TeamPCP compromised Trivy, pivoted to LiteLLM, and turned a popular AI proxy into a credential-stealing weapon targeting AWS IMDS, Secrets Manager, and Kubernetes.

    LiteLLMSupply ChainAWS Security
    Read
    AWS Security5 min read

    AWS Security Cards: Free Offensive Security Reference for 60 AWS Services

    Free, open-source security reference cards covering attack vectors, misconfigurations, enumeration commands, privilege escalation, persistence, detection, and defense for 60 AWS services.

    AWS SecurityOpen SourcePenetration Testing
    Read
    AWS Security6 min read

    I Just Became an AWS Community Builder ... And I Owe It to You

    A thank you to my readers, and a call to support open source AWS tools.

    AWSCloud ComputingOpen Source
    Read
    Developer Tools12 min read

    awsmap v1.5.0: Your AWS Inventory Now Has a Brain

    A few weeks ago I published awsmap. Scan your AWS account. 140 services. One command. This is v1.5.0 with SQLite storage, natural language queries, pre-built security audits, and multi-account support.

    AWSCLI ToolsCloud Inventory
    Read
    AWS Security12 min read

    AWS Security Audit Checklist: The Complete 2026 Guide

    A comprehensive AWS security audit checklist covering IAM, S3, networking, logging, and compliance. Follow this step-by-step guide to secure your AWS infrastructure.

    AWS SecuritySecurity AuditIAM
    Read
    AWS Security10 min read

    AWS IAM Security Best Practices: A Comprehensive Guide

    Learn the essential AWS IAM best practices to secure your cloud environment. Covers least privilege, MFA, roles, policies, and access management strategies.

    IAMAWS SecurityAccess Management
    Read
    Developer Tools7 min read

    awsmap — Find Everything Running in Your AWS Account

    A CLI tool that scans 140+ AWS services across all regions in about 130 seconds, generating HTML, JSON, or CSV inventory reports for audits, cost analysis, and security reviews.

    AWSCLI ToolsCloud Inventory
    Read

    Need Expert AWS Security Help?

    Our team of AWS-certified consultants can help you implement the security best practices discussed in our articles.