AWS Identity and Access Management (IAM) is at the heart of securing cloud environments, yet missteps can leave organizations exposed. From enforcing least privilege to centralizing identity, modern ...
Naor Haziz’s discovery shows how a compromised container on EC2-backed ECS tasks can impersonate the ECS agent and steal IAM credentials from other tasks—without host access. At Black Hat USA 2025, ...