ajaybateman Profile Banner
Adam Bateman //O Profile
Adam Bateman //O

@ajaybateman

Followers
238
Following
255
Media
3
Statuses
175

Co-founder, CEO @pushsecurity

London, England
Joined August 2009
Don't wanna be here? Send us removal request.
@jkamdjou
Josh Kamdjou
13 days
big news
@sublime_sec
Sublime Security
13 days
We’re excited to announce that Sublime has raised $150M in a Series C led by @Georgian_io, joined by new investors @Avenir_Growth, @01Advisors, @jonoberheide, and @nicoleperlroth, and existing investors @IndexVentures, @IVP, @slow, and @CitiVentures. This year we launched ASA
3
5
19
@TechCrunch
TechCrunch
6 months
A decade in, bootstrapped Thinkst Canary reaches $20M in ARR without VC funding | TechCrunch
Tweet card summary image
techcrunch.com
Reflecting on 10 years since its launch, the honeypot maker explains why the company did not take on any VC funding.
1
11
36
@ericabrescia
Erica Brescia
7 months
Thrilled to be partnering with @PushSecurity to lead their Series B! Push is bring identity security to where work happens today - the browser. Hear from me, CEO @ajaybateman and @jordan_segall on why Push is the future of identity security:
1
5
12
@jukelennings
Luke Jennings
7 months
Someone is using Evilginx to target customers of Onfido, part of Entrust, with a malicious Google advert that comes above the legitimate Onfido advert 🤯 Yes that us[.]com domain is actually an evilginx server - guess which advert is the malicious one
2
17
26
@jukelennings
Luke Jennings
1 year
7/ At first, this might seem obvious, unrealistic or not that big a deal. Read the full article and dwell on it for a while. Trust me, the more you think about it, the more crazy you'll realize this is. Full article -
Tweet card summary image
pushsecurity.com
How phishing for email verification can be combined with cross-IdP impersonation to gain direct access to downstream SaaS and bypass hardened IdP accounts.
0
1
1
@jukelennings
Luke Jennings
1 year
1/ A new class of phishing - how verification phishing and cross-idp impersonation can bypass your SSO. Here is a video demo, but this is one where you really need to read the full article too - https://t.co/R6xZaawwpr I'll summarize the key points in this thread.
5
19
54
@GoogleCloudSec
Google Cloud Security
1 year
Identity Threat Detection and Response…What is it and how do we define it? @ajaybateman from @PushSecurity, breaks it down on the @CloudSecPodcast and other tools you may need in your Security defenses. 🎧 Don’t miss this episode! https://t.co/pJMqSKFeag #ITDR #CloudSecurity
0
6
8
@jukelennings
Luke Jennings
1 year
1/ It’s fascinating how many layers of protection even poorly written AiTM phishing kits put in place to frustrate discovery now. I’m talking about the type of kit where the authors forgot to implement the JS encryption function placeholder they wrote so it returns clear text😂
2
2
3
@TheHackersNews
The Hacker News
1 year
Is the Snowflake breach, touted as the biggest in history, identity security’s WannaCry moment? Join Luke Jennings, VP R&D at @PushSecurity, to explore what Snowflake shows us about the complexity of the identity attack surface, and discuss the practical steps that
3
23
41
@jukelennings
Luke Jennings
1 year
Some asked how to remove these ghost logins from Snowflake after migrating to SAML SSO. You can unset a user's password. The guidance is here: https://t.co/iyfJ6y8kzz
community.snowflake.com
Join our community of data professionals to learn, connect, share and innovate together
@jukelennings
Luke Jennings
1 year
10/ I wouldn’t be surprised if organizations responding to Snowflake right now think they’ve solved the problem by migrating their users to use SSO, without realizing they’re not actually securing those existing vulnerable identities, just creating new ones on top.
0
2
7
@PushSecurity
Push
1 year
The Snowflake breach will be for cloud identity attacks what WannaCry was for Ransomware. Join @jukelennings to explore the practical takeaways from the incident. Select the best time for you using the dropdown menu. https://t.co/2JnS0FfB5C
0
3
2
@jaredcatkinson
Jared Atkinson
1 year
While recommendations to enable MFA will certainly help combat these types of threats, it is important for organizations to understand the MFA is not a panacea. One example, described by @jukelennings of @PushSecurity , of how attackers can subvert MFA is Session Cookie Theft.
@jaredcatkinson
Jared Atkinson
1 year
There's been lots of reporting on the campaign against Snowflake DB, so I thought it'd be useful to look at it from an Attack Path PoV. This post shows how you can create an graph for your SNOW deployment & what that tells us about the campaign. https://t.co/1crZ5n0rL0
1
3
12
@haroonmeer
haroon meer
1 year
This year @ThinkstCanary cleared $19m in ARR. - We still have less than 40 people... - We still do "no" outbound sales... We believe more security-product companies can do this too, by focusing a little more on customer-love. We spoke about it at the @DecibelVC event at RSAC.
12
41
253
@haroonmeer
haroon meer
2 years
In town for #RSAC next week? I have a (super brief) talk at the @DecibelVC Oasis (on Tuesday) on why cybersecurity products need to focus a little less on war and a little more on love¹. https://t.co/0F7nO4y2nD __ ¹ With @ThinkstCanary as a case-study.
Tweet card summary image
luma.com
Please join us at the Decibel “Oasis” MeetUp as we host cybersecurity founders and early adopters seeking fresh perspectives and open networking with builders…
1
4
9
@ajaybateman
Adam Bateman //O
2 years
Now you can detect and block identity attacks directly inside any web browser. 1. Stop corp password reuse and phishing 2. Detect EvilGinx/EvilNoVNC 3. Session Hijacking detection ... and more. Hear the full announcement on @riskybusiness https://t.co/xQH9Yy2Kdj
0
8
11
@ajaybateman
Adam Bateman //O
2 years
Bypass MFA, own an Okta account, then persist after you are shut down. 1. Trick employee to auth to Okta via a transparent VNC session 2. Persist on downstream SaaS 3. SAMLJacking for "lateral movement" Check it out: https://t.co/RCrbZewuZu #redteam #blueteam
0
6
8
@PushSecurity
Push
2 years
We've put together an index of the latest identity-based attacks, focusing on examples of networkless and SaaS-SaaS attacks that have been publicly disclosed. These attacks can tell us a lot about where identity attacks are headed. Check it out!
Tweet card summary image
pushsecurity.com
To keep track of how identity attacks are evolving, we’ve put together this helpful index of recent breaches, focusing on the latest identity-based techniques.
0
3
13
@jukelennings
Luke Jennings
2 years
Can admins steal cloud password manager secrets? Tl;dr - Yes! I use Dashlane as an example but it’s a generic approach and may end up a hash dumping equivalent for the SaaS-native world. It’s worth understanding the details! https://t.co/ZujUvLDVk2
Tweet card summary image
pushsecurity.com
Can admins access the secrets from your corporate password manager? If so, how does this affect incident response in a compromised admin account scenario?
0
6
21
@_xpn_
Adam Chester 🏴‍☠️
2 years
Catching @jukelennings talk on the evolution of attacks against Assad platforms 🔥 #socon2024
1
5
29