Appsecco Research

Security Research & Insights

Technical deep dives from the team that tests products for a living.

Cloud & AWS Security

AWS misconfigurations are the #1 attack vector we find in product security assessments. These deep dives cover IAM, EC2, Lambda, App Runner, and cloud-native attack paths.

AWS Cloud Security

Exploiting IAM security Misconfigurations — Part 2

Part 2 of the IAM misconfiguration series: exploiting overly permissive CreatePolicyVersion permissions to escalate privileges and gain access to sensitive AWS resources like S3.

Appsecco · · 4 min
AWS Apprunner

Getting shell and data access in AWS App Runner

What happens when an attacker gains remote code execution in an AWS App Runner container — a research walkthrough of pivoting from RCE to stealing secrets from AWS Secrets Manager.

Appsecco · · 6 min
Cloud Security Aws Security

Exploiting IAM security Misconfigurations — Part 1

How attackers exploit AWS IAM misconfigurations — starting with a misconfigured AssumeRole policy — to perform privilege escalation and move laterally through cloud environments.

Appsecco · · 5 min

Kubernetes Security

Container orchestration expands the attack surface. We test K8s clusters the way real attackers approach them — from RBAC to pod escapes.

Vulnerability Analysis

When critical vulnerabilities emerge, we break them down with technical depth — what happened, how it was exploited, and what you should do about it.

mimikatz Pentesting

Zerologon (CVE-2020–1472) detection, patching and monitoring

A technical overview of Zerologon (CVE-2020-1472), the CVSS 10 Windows Netlogon flaw that gives unauthenticated attackers domain admin — with detection, exploitation, patching, and monitoring guidance.

Appsecco · · 4 min

Docker & Container Security

Containers are only as secure as their configuration. Hardening guides and attack techniques for Docker and container runtimes.

Security Docker

Top 10 Docker Hardening Best Practices

Ten actionable Docker security practices — from keeping the host kernel patched to using AppArmor and dropping capabilities — to reduce the attack surface of containerised workloads.

Appsecco · · 8 min

Identity & Authentication

Broken authentication is consistently in the OWASP Top 10. We cover identity platforms, session management, and auth bypass techniques — including Cognito and Google Identity Platform.

Identity Platform Firebaseauthentication

Exploiting weak configurations in Google Identity Platform

How misconfigured Google Cloud Identity Platform (Firebase) applications can leak API keys and auth tokens, allowing unauthenticated users to query, modify, or delete backend identity data.

Appsecco · · 6 min

AppSec Engineering

Security architecture, authorization patterns, and engineering practices that make products harder to break.

Ready to go deeper?

See what these vulnerabilities look like in your product

Every post we publish comes from real work with real products. Let us apply the same thinking to yours.

Get a security assessment