Kennedy Torkura's Avatar

Kennedy Torkura

@run2obtain.bsky.social

Co-Founder & CTO @ http://mitigant.io ✨ AWS Community Builder.✨Cloud Attack Emulation 🌩️

28 Followers  |  76 Following  |  7 Posts  |  Joined: 01.01.2025  |  1.3925

Latest posts by run2obtain.bsky.social on Bluesky

Post image

πŸ’₯ A New Dawn: Attack-as-Code | Attack Scheduler 🀺
These new features would change your cloud security game FOREVER.

These features streamline the adoption of Continuous Threat Exposure Management, mature Detection Engineering functions & supercharge SOC teams. Details πŸ‘‰ mitigant.io/en/blog/feat...

31.01.2025 17:47 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
DIYβ€Šβ€”β€ŠBuilding a Cost-Effective Questionnaire Automation with Bedrock Security questionnaires are very common today. When customers consider your product, especially if you’re a startup, they often ask for…

I built a PoC using Amazon Bedrock to automate security questionnaires. A centralized, secure knowledge base + zero cost when idle makes it perfect for occasional use. medium.com/@adan.alvare...

23.01.2025 07:20 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Demystifying Amazon Bedrock LLMJacking Attacks | Mitigant LLMJacking attacks are increasingly targeting GenAI workloads on Amazon Bedrock. Cybercriminals illegally gain access to Large Language Models during LLMJacking attacks and resell this access via chat...

These logs are essential for understanding attacks that target models, such as LLMJacking. This level of understanding is imperative for preventing, detecting, and responding to such attacks and other forms of abuse.

See some details about LLMJacking here -> mitigant.io/de/blog/demy...

25.01.2025 13:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

These include model input/output data with important details like event timestamps, request IDs, model IDs, token usage, and all the cool stuff that often determine whether an attacker gets in successfully or is frustrated away! ☠️

25.01.2025 13:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

⚑ Bedrock Security: Model Invocation Logs + CloudWatch πŸ’₯

Several Bedrock events are available in Cloudtrail, but model-level events aren't.

Leverage model invocation logs to breach this visibility gap. These logs contain critical information for security auditing, abuse detection, etc

25.01.2025 13:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

πŸ” WTF is Detection Engineering Maturity πŸ”Ž

Do you want to build a DE fxn from the ground up, or mature the fxn, or know what's up with this DE thing? πŸ€”
πŸ‘‰ Check out the Detection Engineering Maturity Matrix-> detectionengineering.io
#detectionengineering #securityoperations #cloudsecurity

16.01.2025 10:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

⚑Making Security Agile: Attack-as-Code⚑

Security validation should be easy, repeatable, consistent & versioned. Enter Attack-as-Code!

πŸ‘‰ Detection engineering use cases -> mitigant.io/en/blog/clou...

#RedTeam #PurpleTeam #securityoperations #awssecurity #threathunting #blueteam #threatdetection

09.01.2025 13:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

🀺 Beyond SSRF: When SSM Agents Go Rogue 🐞

πŸ’₯ Okay, we love SSM Agents! They are great tools for managing EC2 Instances at scale. However, if attackers abuse them, they could become pain points.

πŸ€” So what can go wrong?

Check it out -> mitigant.io/en/blog/leve...

06.01.2025 12:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@run2obtain is following 20 prominent accounts