• Skip to primary navigation
  • Skip to main content
GreyKeep Security logo

GreyKeep Security

Expert security for an evolving digital age

  • Services
  • Our Approach
  • Blog
  • About
  • Contact Us
  • Show Search
Hide Search

Cloud

9 Challenges to Securing the Cloud

greykeep · February 28, 2024 ·

Securing the cloud

Over the past two decades, the tech industry has witnessed a marked shift from traditional enterprise networks and collocation data centers to cloud computing. Cloud computing allows users to access servers, storage, and applications over the internet. In contrast to conventional enterprise networks that are typically built onsite and require a significant investment in hardware, software, and personnel to operate and maintain, cloud computing requires no on-premises infrastructure. Cloud service providers (CSPs), such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, offer automated services that allow customers to provision new systems and applications quickly and efficiently and scale their environments on demand. Despite its numerous advantages, cloud computing introduces several challenges that IT departments, security teams, and application developers must consider when securing their cloud environments.

[Read more…] about 9 Challenges to Securing the Cloud

MinIO Exploit Reveals Novel Cloud Attack Vector

greykeep · September 7, 2023 ·

MinIO logo on cloud background
Photo by Engin Akyurt

Researchers at Security Joes recently discovered threat actors leveraging critical vulnerabilities in MinIO to infiltrate a cloud network. According to the blog post, the attack represents a novel approach to compromising cloud assets using non-native solutions.

[Read more…] about MinIO Exploit Reveals Novel Cloud Attack Vector

Security Researchers Repurpose Amazon SSM Agent as a Remote Access Trojan

greykeep · August 4, 2023 ·

Laptop computer displaying AWS logo

Security researchers at Mitiga have discovered a technique for using AWS Systems Manager (SSM) Agent as a remote access trojan (RAT). The technique allows for persistent command and control of a compromised host by an attacker from within another AWS account.

SSM Agent is software that allows administrators to configure, manage, and update AWS resources through the Systems Manager service. It can be installed on a various systems, including Amazon Elastic Compute Cloud (EC2) instances, edge devices, on-premises servers, and virtual machines.

[Read more…] about Security Researchers Repurpose Amazon SSM Agent as a Remote Access Trojan

How can we help you become more secure? Contact Us

GreyKeep Security

© 2025 GreyKeep Security LLC ยท All Rights Reserved

  • Services
  • Our Approach
  • GreyKeep Security Blog
  • About Us
  • Contact Us