PinnedCybersecurity — It’s All About TrustLast year, I wrote about the importance of understanding risks in cybersecurity and the critical role of risk reduction. Recently, I’ve…Dec 30, 20234Dec 30, 20234
DIY — Evaluating AWS Native Approaches for Detecting Suspicious API CallsWhile in my previous articles from the DIY series, I explored how to build solutions with LLMs (Using Semgrep with LLMs and Building a…Mar 21Mar 21
DIY — Using Semgrep with LLMs to Improve Code ReviewsDIY code reviews: Using open-source Semgrep + AWS Bedrock AI to auto-suggest fixes for vulnerabilities.Feb 22Feb 22
Breached? Not Game Over: Learn How to Turn the Tables on AWS Attackers!A breach in AWS isn’t game over, initial access is just the first move. Learn how to rig the game and win.Feb 9Feb 9
DIY — Building a Cost-Effective Questionnaire Automation with BedrockSecurity questionnaires are very common today. When customers consider your product, especially if you’re a startup, they often ask for…Jan 202Jan 202
GetFederationToken: A Simple AWS Persistence Technique Used in the WildMy last two articles (how attackers can abuse IAM Roles Anywhere for persistent AWS access and gaining AWS persistence by updating a SAML…Dec 6, 20241Dec 6, 20241
How Attackers Can Abuse IAM Roles Anywhere for Persistent AWS AccessWhen AWS introduced IAM Roles Anywhere in July 2022 (AWS Announcement), I made my first contribution to Stratus Red Team. I believed this…Oct 27, 2024Oct 27, 2024
Gaining AWS Persistence by Updating a SAML Identity ProviderWhen an attacker compromises an AWS account, one of the first tactics they will try is gaining persistence. This is because, in many cases…Sep 22, 20241Sep 22, 20241
Discover New CloudTrail Logs on TrailDiscover, Powered by Grimoire!On August 9th, Christophe from Datadog released Grimoire during the DEFCON Cloud Village talk titled “Catch Them All! Detection Engineering…Aug 25, 20241Aug 25, 20241
Automating Incident Response in AWS: Blocking a Compromised Identity Center UserWhen responding to incidents, especially in the cloud, every second matters as large parts of the attack might be automated. Because of…Jun 3, 20242Jun 3, 20242