In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lat...
![](https://blog.pwnedlabs.io/hubfs/gcp_cloud_build.png)
The latest techniques in hacking and defending | Cybersecurity news and views
The latest techniques in hacking and defending | Cybersecurity news and views
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lat...
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwne...
Many people want to know "how do I get started with AWS security?", and this blog post is for them. ...
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned...
Join us as we get started with using Pacu - an AWS exploitation framework created by Rhino Security ...
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LO...
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security...
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on...
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.