1aN0rmus
@TekDefense
Followers
4K
Following
4K
Media
507
Statuses
5K
CTO at @permisosecurity Alum: @Mandiant, https://t.co/kqlvYwe86k, USMC
Joined March 2011
The last few months I have had so much fun rapidly prototyping personal and @permisosecurity projects. I treat every weekend as a hackathon. Using @cursor_ai has been a game changer for me to be able to crank out fast and mostly polished POCs. Today, I'm gonna showcase some of
1
3
20
AI security makes more sense when you see it through identity. Ian Ahl explains why most “AI incidents” come down to stolen creds, OAuth abuse, and over-privileged accounts and how to fix it with Discover. Protect. Defend. Stream now:
0
3
5
Cloud logs all speak a different language. AWS ≠ GCP ≠ SaaS ≠ IdP. P0LR Espresso is an open source tool that normalizes logs across environments so defenders get fast, strong shots of context during live response. Read more:
permiso.io
P0LR Espresso helps threat hunters and DFIR teams unify AWS, GCP, Azure and SaaS logs into one schema to speed cloud investigations and analysis.
0
2
6
In his recent article in @crunchbasenews, Permiso's Co-founder and Co-CEO Jason Martin talks about the impact #ScatteredSpider has on businesses and how to think about defending against them. "When modeling approaches to increase resilience against their attacks it’s best to
news.crunchbase.com
Prolific hacking group Scattered Spider is able to successfully use compromised employee credentials in their attacks. Jason Martin, co-founder and co-CEO of Permiso Security, shares how businesses...
0
1
3
⚡️AI adoption is outpacing security. Permiso delivers **complete visibility** into AI users, builders & agents with runtime intelligence that stops hidden threats. Blog post here: https://t.co/sygmClA5kt
0
3
3
Great write up from the @The_Cyber_News on our latest open-source tool, #Inboxfuscation, in their newsletter today. "A new open-source tool named Inboxfuscation can create malicious inbox rules in Microsoft Exchange that are difficult for security tools to detect. Developed by
cybersecuritynews.com
This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the escalating challenges facing defenders.
0
4
5
Love seeing our work at @PermisoSecurity being shared with the community! I had the chance to develop Inboxfuscation an open-source tool to detect malicious inbox rules. Excited to see it getting out there!
🚨 Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evades Detection Read more: https://t.co/pygskQGxHc Attackers increasingly exploit Microsoft Exchange inbox rules to maintain persistence and exfiltrate data within enterprise environments. Inboxfuscation
0
2
5
If this guy gets anything less than 1M in rewards I’m canceling my MSFT subscriptions in protest 😊
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
0
2
10
Two Permiso speakers on the international stage tomorrow: Andi Ahmeti will be presenting "Inbox Under Siege: Real-World BEC Attacks, Tactics & Lessons Learend" at @BSidesTirana tomorrow at 3:40 local time. @danielhbohannon will be presenting "SkyScalpel: Making & Breaking
0
2
2
From S1ngularity to Shai-Hulud, NPM is the core topic we cover in episode 2 of The Permiso Security podcast
2
2
12
"Jubair is charged with computer fraud conspiracy, two counts of computer fraud, wire fraud conspiracy, two counts of wire fraud, and money laundering conspiracy. If convicted, he faces a maximum penalty of 95 years in prison. On Tuesday, Sept. 16, U.K. authorities arrested
"An English criminal, you know, is always better concealed in London than anywhere else." – Jules Verne (Around the World in 80 Days)
1
3
10
Gartner has been out of touch with tech analysis: and their latest report on AI coding assistants show just by how much. - They rank Amazon, GitLab, GCP, Windsurf all above Cursor - No mention of Claude Code or OpenAI Codex Cursor pays Gartner nothing: others do Embarrassing
120
119
1K
Both allergic to Windows too, though implemented very differently
0
0
1
Love that both the S1ngularity (Nx) and Shai-Hulud cred theft just encode the output files with triple b64
1
0
4
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
143
908
3K
My CEO this week: “what are we doing about this npm supply chain attack?” Also my CEO this week: “what are we doing about this npm supply chain attack?” Also my CEO this week: “what are we doing about this npm supply chain attack?”
37
54
1K
ctrl/tinycolor and 40+ NPM Packages Compromised
stepsecurity.io
The Shai-Hulud worm has infected over 500 NPM packages including @ctrl/tinycolor in an unprecedented self-propagating supply chain attack. The malware harvests AWS/GCP/Azure credentials using...
0
3
3
The full write-up is now live, blog post is attached below if you’d like the deep dive. Blog: https://t.co/zzFYZIIAmE Github: https://t.co/Drhq49pFWh
#Permiso #M365 #InboxRules #Obfuscation #Unicode #Evade #Persistence #Detection #Inboxfuscation #BlueTeamCon
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
3
6