
1aN0rmus
@TekDefense
Followers
4K
Following
4K
Media
493
Statuses
5K
CTO at @permisosecurity Alum: @Mandiant, https://t.co/kqlvYwe86k, USMC
Joined March 2011
The last few months I have had so much fun rapidly prototyping personal and @permisosecurity projects. I treat every weekend as a hackathon. Using @cursor_ai has been a game changer for me to be able to crank out fast and mostly polished POCs. Today, I'm gonna showcase some of
1
3
19
RT @daycyberwox: Had the pleasure of being on @wiz_io Crying Out Cloud Podcast!. Go check it out!.
0
3
0
RT @permisosecurity: We're excited to announce several strategic go-to-market hires and key internal promotions to help fuel our next phase….
0
1
0
RT @123Le_Bron: I am back with a new blog mini series. This is for any of my Incident Response folks or people who need to secure their AWS….
chesterlebron.blogspot.com
Mini-series to discuss the similarities and differences of cloud vs. on-premise investigations, starting with the EC2 service
0
18
0
RT @permisosecurity: Thanks to Marco Lancini for including Bleon Proko's recent blog post on how #AWS Managed Active Directory security vul….
cloudseclist.com
Issue 297 of CloudSecList
0
3
0
RT @CloudSecList: 📖 CloudSecList Issue 297 just got released, w/ content from @wiz_io @permisosecurity @datadoghq @tenablesecurity and more….
cloudseclist.com
Issue 297 of CloudSecList
0
1
0
RT @permisosecurity: Permiso's co-founder and co-CEO Jason Martin weighs in on securing agentic AI for @CIOonline. "The new kid on the cyb….
cio.com
AI agents move fast — too fast for your current security. Without action, they’ll crack your systems wide open before you even see them coming.
0
1
0
RT @ekriessmann: Accelerating advanced manufacturing at scale is critically important for Team America. Excited to partner with Chris alo….
0
8
0
RT @permisosecurity: Check out Permiso P0 Labs’ latest research about AWS Managed Active Directory compliments of Bleon Proko!. Turns out A….
0
6
0
RT @_sigil: 🕵️♀️ Looking to escalate privileges with a first-party Microsoft app? How do federated domain backdoors work? And what's an ap….
securitylabs.datadoghq.com
Backdooring Microsoft's applications is far from over. Adding service principal credentials to these apps to escalate privileges and obfuscate activities has been seen in nation-state attacks, and...
0
25
0
The best cloud focused security conference is about to kick off! Remember it is all streamed, no excuse to not watch this stacked set of talks. Super excited for the lineup! Be sure to check out @permisosecurity own, Nathan Eades talk on PIM at 1300 ET.
fwdcloudsec.org
1
1
7
RT @redcanary: Next week, Red Canary's Principal Threat Researcher Matt Graeber is headed to @fwdcloudsec in Denver, CO! ⛰️. Join Matt on M….
0
1
0
RT @MrDanPerez: Great blog from @gabby_roncone and @wxs on #UNC6293 a suspected #Russia actor utilizing an interesting phishing technique. ….
0
7
0
RT @OpenAI: Introducing the OpenAI Podcast—a series of conversations with the people shaping AI. @sama joins @andrewmayne on the first ep….
0
691
0
RT @_sigil: 🕵️♀️ I'll be presenting "I SPy: Rethinking Entra ID research for new paths to Global Admin” at fwd:cloudsec June 30-July 1, al….
youtube.com
fwd:cloudsec is a non-profit, conference on cloud security. At this conference you can expect discussions about all the major cloud platforms, both attack and defense research, limitations of...
0
19
0
RT @Frichette_n: My RSAC talk “Critiquing Cloud Criminals” is on YouTube! I had a good time pointing out common OPSEC failures threat actor….
0
4
0
RT @permisosecurity: If you're heading to fwd:cloudsec in a few weeks, we are teaming up with our friends at @tamnoon_io to host Arcade & A….
0
3
0
RT @RoxaneFis: AWS CloudTrail logging is not as bulletproof as many teams assume. Recent research by @permisosecurity has exposed a class….
0
6
0
After yesterdays test on the @permisosecurity MCP, I tried a bunch more basic prompt injection techniques by embedding names and tags in AWS resources with instructions. All available models in Cursor handled this super well. Though I have a bunch more ideas to try!
0
2
4