
Kennedy
@run2obtain
Followers
849
Following
2K
Media
310
Statuses
2K
Co-Founder & CTO @ https://t.co/xLzwrRqO9A ✨ AWS Community Builder.✨Cloud Attack Emulation 🌩️
Joined May 2009
☠️ Enemy at the Gates: The Battle to OWN Your Cloud 🤺. Guess which is the most underrated MITRE ATT&CK Tactic in the cloud matrix?. ✨ DISCOVERY. Yup. But i think the confusion is understanding the difference between "Reconnaissance" and "Discovery", 'cos folks tend to focus
1
2
8
⚔️ Ransomware Countermeasures: Beyond Backups ⚔️. Backups should not be your ultimate ransomware countermeasure! Go the extra mile 👇.
☠️ All Your Backups Are Belong to Us: Ransomware New Normal 💀. 94% of organizations hit by ransomware assert that cybercriminals attempted to compromise their backups during the attack 🙀. 💥 So, you'd agree with me that relying on backups for ransomware countermeasures is a
2
0
0
Do you operate a childlike security team despite belonging to a "mature" organization? 🤔.
💥 Azure Security Maturity: Path to Security Adulthood💥. Hey Azure cloudy defenders, what guides your security maturity efforts? 💭. A wise man once said:. 🚼 "When I was a child, I spoke as a child, I understood as a child, I thought as a child: but when I became a man, I put
0
0
0
Offensive Security Testing remains tied to the pre-cloud era, despite the significant benefits the cloud offers. Fun fact: attackers leverage this cloudy juice to hit with speed. How about defender ?. Defend at cloud speed 👇.
🚨 WTF is Cloud Attack Emulation 🚨. TLDR; You won't believe the level of simplicity we present offensive security testing at Mitigant. This interactive demo would convince you --> 👉 Technology is moving at an incredible speed!. Software ate the world,
0
0
1
⚔️ Be the Hunter; Not the Hunted ⚔️. Multi-domain cyber-hunting is the recipe for notorious cyber villains like Scattered Spider.
🤺 Maze of Malice: The Hunt for Scattered Spider ☠️. You heard it before -> "100 days for the thief, one day for the owner" 🚨. But that saying is not a given, especially in cyber. Bringing it to fruition requires intentional efforts. 🙌. 🎊 But that's a good thing, 'cos it
0
0
0
💥How do you future-proof zero-day vulnerabilities? 👇.
☠️ Can You Detect What You Can’t Predict: Lessons from ToolShell ☠️. Have you seen the recent blog post from the folks at the @MITREcorp Center for Threat-Informed Defense?. ⚡ Aptly titled "Can You Detect What You Can’t Predict? Lessons from SharePoint Vulnerability
0
0
1
☠️ Can You Detect What You Can’t Predict: Lessons from ToolShell ☠️. Have you seen the recent blog post from the folks at the @MITREcorp Center for Threat-Informed Defense?. ⚡ Aptly titled "Can You Detect What You Can’t Predict? Lessons from SharePoint Vulnerability
0
1
1
How to Make @Azure Sentinel Great Again 👇.
🕵Blog Article: Microsoft Sentinel + Mitigant Cloud Attack Emulation🤺. Hey cloudy defenders, how often do you feel your KQL-based detection rules aren’t giving you the vibes you’d want to get from Microsoft Sentinel?. 🔥 In our recent Mitigant blog post, we take a deep dive
0
0
0
Accompanying blog post now out with more details. Check it out ->
mitigant.io
Ultimate Combo: Cloud Attack Emulation meets Microsoft Sentinel
0
0
0
🛡️ Ready for AI Incidents? 🛡️. AI Incident readiness is not being pessimistic! It's the most effective way to prevent AI incidents from happening. Doubt me? 👇.
🤖 Threat Detection & Incident Response in the AI Era 🤖. The @owasp GenAI Security Project recently released the GenAI Incident Response Guide v1! It's a must-read for security folks involved in detection and response. 🙌. One of the first things that struck me as I perused the
0
0
0