The many ways to obtain credentials in AWS
Dive into the complexities of AWS IAM credentials and uncover how defenders can stay ahead with in-depth knowledge of SDK behaviors and service-specific mechanisms.
Dive into the complexities of AWS IAM credentials and uncover how defenders can stay ahead with in-depth knowledge of SDK behaviors and service-specific mechanisms.
Wiz Threat Research uncovered a new malware campaign targeting Linux environments attributed to the Diicot threat group.
Wiz Threat Research investigates misconfigurations in Spring Boot Actuator’s endpoints that can leak environment variables, passwords, and API keys, and even lead to remote code execution.
Discover the latest in LLM hijacking activity, including a dive into the JINX-2401 campaign targeting AWS environments with IAM privilege escalation tactics.
AWS re:Invent 2024 brought an avalanche of announcements, with over 500 updates since November. Let's spotlight the most impactful ones for security teams, from Resource Control Policies to centrally managed root access.
Learn about how Wiz helps organizations operationalize vulnerability remediation with true code-to-cloud visibility
Our ongoing commitment to the region continues with product support and leadership expansion.
A supply chain attack on Ultralytics exploited GitHub Actions to inject malicious PyPI packages. Discover how it unfolded and the steps to mitigate the risk.
See what’s new with Wiz at Re:Invent 2024 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure
Wiz is excited to announce the addition of Wiz Code into our Wiz for Gov offering, enabling organizations to visualize attack paths from cloud-to-code and bring guardrails into the software development lifecycle.
A new approach to detect and respond to cloud-native threats
Discover Wizdom: A vibrant community where cloud security professionals connect, collaborate, and lead the charge toward a safer digital future.
Empower SecOps teams to stop incidents before they become breaches
Unlock the Power of AWS Resource Control Policies: Enforce Security and Streamline Governance Across Your Organization.
Wiz Research taps Llama 3 model NVIDIA NIM microservices for sensitive data classification
Discover how Deloitte’s CCMS, powered by Wiz, enhances AWS cloud security with automated workflows, democratized risk management, and streamlined remediation to protect modern cloud environments.
Detect and mitigate CVE-2024-0012 and CVE-2024-9474, PAN-OS vulnerabilities which Wiz Threat Research has observed being exploited in-the-wild. Organizations should patch urgently.
Together, we'll reinvent ASPM and code-to-cloud remediation.
Powerful new remediation and response capabilities enable the real-time enforcement of organizational security policies and streamline incident management.
Centralize security insights, scale adoption, and demonstrate measurable cloud security progress with Wiz
How to overcome challenges and security gaps when using K8s audit logs for forensics and attack detection.
New plugin enables AWS and Wiz customers to leverage generative AI to improve their cloud security posture
Learn about Kubernetes data plane access, including applications running on the cluster, container images, and execution-as-a-service workload types.
Wiz increases investments in products and presence for European customers by enabling support for AWS European Sovereign Cloud (ESC) and new regional headquarters.
Explore Kubernetes control plane access vectors, risks, and security strategies to prevent unauthorized access and protect your clusters from potential threats.