<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Cloud Security Wire</title><description>Cloud Security Intelligence — AWS, Azure, GCP</description><link>https://cloud-security-wire.pages.dev/</link><language>en-us</language><item><title>Azure Entra ID Attack Paths — From Guest User to Global Admin</title><link>https://cloud-security-wire.pages.dev/articles/azure-entra-id-attack-paths/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/azure-entra-id-attack-paths/</guid><description>Microsoft Entra ID (formerly Azure AD) is the identity backbone of most enterprise cloud deployments. This analysis maps the most exploited privilege escalation paths — from consent phishing to app role abuse — and the detective controls to catch them.</description><pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate><category>azure</category><category>misconfiguration</category></item><item><title>AWS IAM Privilege Escalation: PassRole and CreatePolicyVersion Attack Paths</title><link>https://cloud-security-wire.pages.dev/articles/aws-iam-privilege-escalation-passrole/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/aws-iam-privilege-escalation-passrole/</guid><description>A deep-dive into two of the most dangerous AWS IAM misconfigurations — iam:PassRole abuse and iam:CreatePolicyVersion — with exploitation chains, detection opportunities, and remediation guidance.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate><category>aws</category><category>misconfiguration</category></item><item><title>Azure Managed Identity Token Theft via the IMDS Endpoint</title><link>https://cloud-security-wire.pages.dev/articles/azure-managed-identity-abuse/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/azure-managed-identity-abuse/</guid><description>How attackers steal Azure Managed Identity access tokens from the Instance Metadata Service endpoint, pivot to Azure resources, and what defenders can do to detect and limit the blast radius.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><category>azure</category><category>misconfiguration</category></item><item><title>Anatomy of an S3 Data Exposure: ACLs, Bucket Policies, and the Public Access Block</title><link>https://cloud-security-wire.pages.dev/articles/s3-bucket-misconfiguration-data-exposure/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/s3-bucket-misconfiguration-data-exposure/</guid><description>A forensic breakdown of how S3 buckets end up publicly accessible — the interplay between ACLs, bucket policies, and Public Access Block settings — illustrated with real breach patterns and detection techniques.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>aws</category><category>breach-analysis</category></item><item><title>GCP Service Account Keys: Why Downloaded Keys Are a Liability and How to Eliminate Them</title><link>https://cloud-security-wire.pages.dev/articles/gcp-service-account-key-risks/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/gcp-service-account-key-risks/</guid><description>A hardening guide covering the risks of GCP service account key files, how they get leaked, and how to migrate to Workload Identity Federation for keyless authentication across AWS, GitHub Actions, and on-prem workloads.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>gcp</category><category>hardening-guide</category></item><item><title>SSRF to Cloud Metadata: IMDSv1 vs IMDSv2 and Real-World Exploitation</title><link>https://cloud-security-wire.pages.dev/articles/cloud-metadata-ssrf-attacks/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/cloud-metadata-ssrf-attacks/</guid><description>A technical deep-dive into Server-Side Request Forgery attacks targeting cloud metadata services — how IMDSv1 enables credential theft with a single HTTP request, what IMDSv2 actually protects against, and documented real-world exploitation chains.</description><pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate><category>aws</category><category>azure</category><category>gcp</category><category>multi-cloud</category><category>cve-analysis</category></item><item><title>Kubernetes RBAC Pitfalls: Wildcards, cluster-admin Bindings, and Service Account Token Abuse</title><link>https://cloud-security-wire.pages.dev/articles/kubernetes-rbac-misconfigurations/</link><guid isPermaLink="true">https://cloud-security-wire.pages.dev/articles/kubernetes-rbac-misconfigurations/</guid><description>A hardening guide to the most dangerous Kubernetes RBAC misconfigurations — wildcard rules, overbroad cluster-admin bindings, automounted service account tokens — with detection queries and least-privilege policy templates.</description><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><category>multi-cloud</category><category>hardening-guide</category></item></channel></rss>