π₯ A New Dawn: Attack-as-Code | Attack Scheduler π€Ί
These new features would change your cloud security game FOREVER.
These features streamline the adoption of Continuous Threat Exposure Management, mature Detection Engineering functions & supercharge SOC teams. Details π mitigant.io/en/blog/feat...
31.01.2025 17:47 β π 0 π 0 π¬ 0 π 0
Demystifying Amazon Bedrock LLMJacking Attacks | Mitigant
LLMJacking attacks are increasingly targeting GenAI workloads on Amazon Bedrock. Cybercriminals illegally gain access to Large Language Models during LLMJacking attacks and resell this access via chat...
These logs are essential for understanding attacks that target models, such as LLMJacking. This level of understanding is imperative for preventing, detecting, and responding to such attacks and other forms of abuse.
See some details about LLMJacking here -> mitigant.io/de/blog/demy...
25.01.2025 13:44 β π 0 π 0 π¬ 0 π 0
These include model input/output data with important details like event timestamps, request IDs, model IDs, token usage, and all the cool stuff that often determine whether an attacker gets in successfully or is frustrated away! β οΈ
25.01.2025 13:42 β π 0 π 0 π¬ 1 π 0
β‘ Bedrock Security: Model Invocation Logs + CloudWatch π₯
Several Bedrock events are available in Cloudtrail, but model-level events aren't.
Leverage model invocation logs to breach this visibility gap. These logs contain critical information for security auditing, abuse detection, etc
25.01.2025 13:41 β π 0 π 0 π¬ 1 π 0
π WTF is Detection Engineering Maturity π
Do you want to build a DE fxn from the ground up, or mature the fxn, or know what's up with this DE thing? π€
π Check out the Detection Engineering Maturity Matrix-> detectionengineering.io
#detectionengineering #securityoperations #cloudsecurity
16.01.2025 10:49 β π 0 π 0 π¬ 0 π 0
β‘Making Security Agile: Attack-as-Codeβ‘
Security validation should be easy, repeatable, consistent & versioned. Enter Attack-as-Code!
π Detection engineering use cases -> mitigant.io/en/blog/clou...
#RedTeam #PurpleTeam #securityoperations #awssecurity #threathunting #blueteam #threatdetection
09.01.2025 13:29 β π 0 π 0 π¬ 0 π 0
π€Ί Beyond SSRF: When SSM Agents Go Rogue π
π₯ Okay, we love SSM Agents! They are great tools for managing EC2 Instances at scale. However, if attackers abuse them, they could become pain points.
π€ So what can go wrong?
Check it out -> mitigant.io/en/blog/leve...
06.01.2025 12:27 β π 0 π 0 π¬ 0 π 0
AWS Pro | Cloud | Security @trek10.com | Tech enthusiast Musically trapped between a metallic headbang and a bass wobble | Photographer (bsky): @betapixels.photography
Author of "The PRFAQ Framework" (www.theprfaq.com). 18yrs of startups in Seattle & London, MSFT, Amazon. Runner. Cook. Geek.
Tech, software, AI/ML, UX, product, innovation, startups, leadership.
π Seattle
π§π·πΊπΈ
https://calbucci.com/link
The PRFAQ Framework is a book by @calbucci.com that adapts Amazon Working Backwards 6-pager framework to work for everyone. Read the book and download free resources on www.theprfaq.com.
Cloud builder + educator @ https://morganlucas.techportfolio.dev/ | She/her | Reading, Writing, LEGO-rithmatic
The leading media brand empowering startup Europe.
Read our articles here: https://sifted.eu/latest
Subscribe to our newsletter: https://sifted.eu/newsletters
Cloud Security Researcher
Building https://cloudsecurity.club
Blog https://badshah.io
BOMAD LIFE empowers people to offer or receive financial help within their trusted circles, with powerful tools to manage, track, and safeguard personal loans... all in one place.
https://bomad.life
wlkthru.io provides businesses and their employees, with the skills they need to safeguard their digital assets!
Our professionally structured, gamified training, allows you to compete on our leaderboard earn badges & certificates win prizes & more
Staff Security Researcher @datadoghq | DEF CON/Black Hat USA main stage speaker | he/him | OSCP OSWE | I turned hacking AWS into a career | Tweets are my own | Created https://hackingthe.cloud
Security Researcher @ Datadog. πΆ Head in the (Azure) clouds.
Sometimes blogging, always curious. Aim to be, rather than to seem.
Blogs at https://kknowl.es.
Creator of Detection Engineering Weekly (https://detectionengineering.net), Sec Research/Intel/Detection @ Datadog
Security geek, Containers, Kubernetes, Golang/Ruby, hillwalking
Home Page :- https://www.mccune.org.uk
Blog:- https://raesene.github.io
Security Research and Advocacy @ Datadog. Former Principal and Cloud Penetration Testing lead @BishopFox. I like to build, break, learn, and share. β©CloudFox, CloudFoxable, BadPods, IAM Vulnerable
Detection Engineering Leader @ Datadog
Views are strictly my own
An open source encyclopedia of offensive security techniques that can be used in cloud environments. Created and maintained by @frichetten.com
Information security practitioner.
All things cti collection.
Manager, security research @ Datadog | he/him | Chess lover | Blackhat speaker |
ex Sqreen.io, Shieldfy.io | my website: https://eslam.io
Read our Security Labs blog: https://securitylabs.datadoghq.com
Subscribe to our monthly newsletter: https://securitylabs.datadoghq.com/newsletters/