's Avatar

@neuvik.bsky.social

11 Followers  |  1 Following  |  673 Posts  |  Joined: 31.01.2025  |  2.0389

Latest posts by neuvik.bsky.social on Bluesky

Video thumbnail

Want a seat at the table?Β  Whether you're a CISO or just starting out, stop speaking in purely technical metrics.

Start using the language of riskπŸ‘‡ (With Celina Stewart)

03.11.2025 16:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Think one annual report is enough to scare off the monsters? πŸŽƒ

Think again!

Cyber/AI risks are continuous, and your defenses should be too. Continuous risk assessments keep the real threats at bay.

Ready for continuous defense?Β  Learn more: https://neuvik.com/our-services/advanced-assessments/

31.10.2025 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"Who's managing your AI risk?"πŸ€”

If questions about AI governance, councils, policies, or metrics stress you out, you need a clear plan.

Our AI Governance & Program Development services build the framework to manage and measure AI risk

Ready to get started? Contact us: https://tinyurl.com/4cfcpem4

30.10.2025 16:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You need to know if you can find the adversary dwelling in your environment for eight days. Here are three reasons you need a security assessmentΒ  right now:

1️⃣Reduce Dwell Time
2️⃣ Validate Defensive Tools
3️⃣ Address Rapid Changes

Learn more how we can help you here: https://tinyurl.com/yfajh9s2

29.10.2025 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

The moment when you realize you have to stop playing defense and start talking business.

28.10.2025 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

AI vs. Traditional Security: Predictability is the key.πŸ”‘

Traditional systems are deterministic (predictableΒ  results). LLMs are non-deterministic (unpredictable output from the same input).

Standard pentesting fails here.Β 

Want to learn why ?Β 

Read more here: https://tinyurl.com/ys6khabn

27.10.2025 15:01 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Too many companies are failing the same security tests, over and over again.

At Neuvik, we specialize in offensive security and risk assessments, drawing from years of pentests and red team operations!

Ready to stop repeating the same findings?

Learn more: https://neuvik.com/our-services/

26.10.2025 15:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"We know Cyber & AI Risk Management."🀯

Is your IT department feeling like Spongebob?Β 

Don't let the complexity bury your team. We provide the expertise and clarity to turn this chaos into a manageable strategy.

Contact us today to learn how we simplify Cyber & AI Risk Management.

24.10.2025 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Securing AI? Start by understanding risk.

It's more than tech flaws; it's business impact!

You need to learn:

1️⃣ Data Governance
2️⃣ Strict OversightΒ 
3️⃣ Foundational SecurityΒ 

Ready to manage AI risk?

Read the full article! πŸ‘‡
https://tinyurl.com/57x79xfh

23.10.2025 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Hackers weaponized emojis!Β 

The Emoji Jailbreak exploits LLM tokenization. Emojis force dangerous words (like "BπŸ’£mb") to split into "safe" pieces, bypassing security filters, allowing the LLM to generate content it was explicitly supposed to refuse.

How robust are your LLM defenses? Contact us!

22.10.2025 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸ”΅Tomorrow. Don't miss this.

Join Moses Frost,Β  Senior Consultant at Neuvik and author of SANS: SEC588, for a deep dive into AI, emergent risks, and the techniques involved in defending against them.

Sign up for free here: https://tinyurl.com/urdj2m87

21.10.2025 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Neuvik is a 2025 NVTC Cyber50 Honoree!Β 

We're recognized for driving innovation and resilience,Β  helping define the National Capital Region as the cyber excellence epicenter.

Thanks, NVTC!

Read the full press release here:Β  https://tinyurl.com/CYBERHONOREE

20.10.2025 16:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Cloud storage leaking data?Β  Insecure by default settings (like public S3 buckets & open ports) are huge risks!

Attackers use these common entry points. Learn how to lock down:
πŸ”΅ Public Access
πŸ”΅ Over-Permissive Roles
πŸ”΅ Open Ports

Read this to secure your cloud now!πŸ‘‡
https://tinyurl.com/leakedcloud

19.10.2025 17:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Attacking Cloud Systems - with Moses Frost
Alas, you’re running an operation, a pen test, and find that systems are connected to the cloud; you are in awe. Behold as we uncover the astonishing truth a... Attacking Cloud Systems - with Moses Frost

Learning how red teams are owning the cloud.

This in-depth discussion shows how elite attackers bypass MFA, exploit identity misconfigs, and extract credentials without touching endpoints.

Watch now if you're serious about cloud security offense πŸ‘‡

18.10.2025 14:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The moral of the story?Β Cloud breaches aren't loud. They’re quiet, credentialed, and API-driven.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ”Ÿ Pivoting via Azure AD Federation

Even in Okta or Google-managed orgs, Azure AD often still handles device joins or Graph access. Red Teams exploit this bridge using token replay or device joins to escalate across trust boundaries. Used in hybrid assessments to bridge environments.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

9️⃣ Region-Specific Attack Planning

Cloud footprint varies by region:
πŸ‡ΊπŸ‡Έ US startups = full cloud
πŸ‡ͺπŸ‡Ί EU enterprises = hybrid/on-prem

Red Teams tailor initial access and post-ex strategies depending on infra maturity and identity structure.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

8️⃣ Tool-Aided Enumeration with Manual Review

Tools like ScoutSuite, CloudFox, and TokenTactics are used early in engagements. These tools surface misconfigs and identity gaps.Β Used to build initial situational awareness.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

7️⃣ Token Analysis for Recon and Priv Esc

JWTs issued by Azure or AWS contain critical claims (scp, azp, upn). Red Teams can decode tokens using jwt.ms to map what the token can access. We use this to find overly-permissive scopes and escalate privileges.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

6️⃣ Microsoft Graph as a Post-Exploitation Toolkit

After access is granted, red teamers use Graph to:
πŸ”Ž Search inboxes for creds
πŸ“‚ Download attachments
πŸ—‚οΈ List files from OneDrive
πŸ—“οΈ Read calendar entries

It’s quiet, credentialed access and perfect for stealthy data exfil.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

5️⃣ App Consent Phishing to Evade MFA

Rather than steal passwords, attackers trick users into authorizing a malicious Azure app.

Once approved, the app gets delegated Graph API access (including emails, files, and calendars).

Used in phishing engagements to simulate real-world cloud takeovers.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

4️⃣ Identity Confusion Exploits in Apps

Red teams look for apps that rely on mutable claims (like email) instead of immutable identifiers (UPN).

We can then modify lowercase/uppercase in OAuth claims to impersonate users andΒ gain access with no credentials.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

3️⃣ Refresh Token Hijacking for Persistent Access

Attackers phish or extract refresh tokens from memory or browser storage. Once stolen, they reuse it for days or weeks, bypassing MFA.

We use this to stay embedded in your environment without raising red flags.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2️⃣ Dropping Legacy Recon, Embracing API-Based Attacks

On-prem recon uses Nmap. In cloud, we query APIs like AWS CLI or Azure Graph, enumerating services, IAM roles, storage buckets via credentialed API calls, not noisy scans.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

1️⃣ Control Plane Access = Full Cloud Compromise

Red Teams target cloud consoles (e.g., AWS, Azure) to snapshot disks, bypass EDR, and dump credentials offline.

Example: Extracting VMDKs and analyzing LSASS memory with WinDbg.

We do this when endpoint defenses are too hardened for direct access.

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Forget firewalls. Red Teamers target tokens, APIs, and identities.

10 techniques we use to break into cloud environmentsπŸ‘‡

17.10.2025 14:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

The rise of "Shadow AI" is creating major blind spots for security and compliance teams.

Our AI Asset Inventory service solves this problem.

Learn more: https://neuvik.com/our-services/cyber-risk-management/

16.10.2025 14:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Cloud misconfigurations are still one of the top causes of breaches.

At Neuvik, we help you find those mistakes before they’re exploited:

Don’t wait for attackers to find the gaps. Partner with Neuvik to harden your cloud security.

Learn more: https://neuvik.com/our-services/advanced-assessments

15.10.2025 13:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Understanding control vs. data plane is foundational in cloud pentesting. It’s how offensive teams turn a single console foothold into full data compromise. Master this and you’ll see how attackers really pivot in your cloud.

14.10.2025 14:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

⚠️ Real-world abuse scenario

Attackers with control plane access snapshot storage volumes, extract them offline, and dump LSASS. This sidesteps EDRs, since everything happens outside the monitored runtime.

14.10.2025 14:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@neuvik is following 1 prominent accounts