iantshaw Profile Banner
Ian Shaw Profile
Ian Shaw

@iantshaw

Followers
754
Following
866
Media
6
Statuses
3K

CEO at https://t.co/qXDYH05H0D

London
Joined April 2009
Don't wanna be here? Send us removal request.
@jukelennings
Luke Jennings
1 year
1/ The ongoing Snowflake situation has made me realize just how dangerous ghost logins – a SaaS-based persistence technique that I coined last year – can be as an initial access vector. So what is a ghost login, exactly?
2
40
133
@AndreaBarisani
Andrea Barisani
1 year
Remember our Fake Cisco research? https://t.co/SxheHyCM78
Tweet media one
@arstechnica
Ars Technica
1 year
Counterfeit Cisco gear ended up in US military bases, used in combat operations
0
24
86
@PushSecurity
Push
2 years
Oktajacking: A new attack using Okta's AD synchronization to do credential capture for you. Link to @jukelennings full post in 🧡 πŸ‘Š Thanks to @_xpn_ @TrustedSec for the inspiration! #redteam #redteaming #pentest #pentesting #identitysecurity #SSO #okta #infosec
1
5
16
@j0hn__f
john fitzpatrick
2 years
When the guy who fundamentally changed the way the world red-teams/pentests has something to say it's definitely worth a listen: @jukelennings of @PushSecurity on SAAS security talks to @SpecterOps -
Tweet card summary image
open.spotify.com
Detection: Challenging Paradigms Β· Episode
1
1
11
@PushSecurity
Push
2 years
Employees are self-adopting SaaS apps and creating new cloud identities on their own. πŸ’‘ Consider Push to find these identities & guide employees to harden their accounts against attacks. Read the blog in the 🧡 πŸ‘‡ #identitysecurity #saassecurity #security #IAM #tprm
Tweet media one
1
2
3
@PushSecurity
Push
2 years
Attending #BlueHat? Don't miss Push's VP of Research @jukelennings speaking on the new SaaS cyber kill chain! #cybersecurity #saasattacks #saassecurity #infosec #security
Tweet media one
1
1
4
@PushSecurity
Push
2 years
Going to #hacktivity2023? Catch Push's Luke Jennings on Thursday, Oct 5 at 9am in the Security Dome! Link in 🧡 #SaaSsecurity #SaaSattacks #security #infosec
Tweet media one
2
1
2
@MSFTBlueHat
Microsoft BlueHat
2 years
πŸ“£SPEAKER ANNOUNCEMENTπŸ“£ Our next #BlueHat speaker is Luke Jennings @jukelennings from Push Security! Luke will present a talk titled "The new SaaS cyber kill chain." πŸ‘
Tweet media one
0
3
17
@PushSecurity
Push
2 years
Credential stuffing: the most common attack against SaaS identities. πŸ’₯ Auth0 recently reported that credential stuffing accounts for *34% of overall traffic/authentication events on their platform.* Link in the 🧡! #credentialstuffing #saasattacks #identitysecurity #iam
Tweet media one
1
1
1
@Atos
Atos
4 years
Atos joins forces with @intigriti, the EU leading platform for #bugbounty and ethical hacking to offer a end-to-end service for organizations. But, what the hack is bug bounty? πŸ› And how can it help improve your digital security? Learn more πŸ‘‡ https://t.co/X8fQLfnNhh
Tweet media one
2
6
13
@PushSecurity
Push
2 years
PowerSaaS, you're saying, then? Will try to stop branding it, sorry...
@jukelennings
Luke Jennings
2 years
I feel like shadow workflows are the closest equivalent of offensive PowerShell for the SaaS world. Check out the second post in my series on chaining SaaS attacks and come see me speak about this and a lot more at #44con on Thursday 14th September! https://t.co/EzsOLOQzQ2
0
1
0
@PushSecurity
Push
2 years
While OAuth scopes and third-party integrations provide seamless online user authentication, they also carry significant risk. πŸ‘€ Watch out for these common, dangerous scopes (more in the blog post, linked in 🧡!) #security #OAuth #thirdpartyrisk #tprm #sspm #casb #infosec
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
5
@SamuelRyde
Samuel Ryde
2 years
GM! Time to repost one of my favourite places on earth, Preston Bus Station.
Tweet media one
1
3
7
@PushSecurity
Push
2 years
Great interview with our CEO and co-founder @ajaybateman and @dspark on @CISOseries about "Securing identity in the age of self-service" "It's about creating a paved path for employees to walk..." Link in 🧡!
1
2
8
@jukelennings
Luke Jennings
2 years
1/ I kinda accidentally owned myself with my own shadow workflow attack. I definitely think they are going to become a standard technique. I mean they are pretty much the offensive powershell of the SaaS world! So how did this happen?
1
6
10
@PushSecurity
Push
2 years
πŸ”Ž Focus on account security to reduce SaaS risks πŸ“‘ Read our latest article to learn how to manage the risk of SaaS security, shadow IDs, identities, and accounts. Link in 🧡 #SaaSsecurity #shadowIT #shadowidentities #SaaSmanagement #SaaSsprawl #shadowaccounts
Tweet media one
1
2
1
@PushSecurity
Push
2 years
πŸ‘‹ New feature alert! Classify SaaS apps in the Push platform based on the sensitivity of the data they contain or the permissions they've been granted. Use the Approval status to capture your decision about an app -- is it in or out? Link in 🧡 #SaaSsecurity #security
2
3
7