Rami 's Avatar

Rami

@ramimac.me.bsky.social

security, for the internet, at Wiz opinionated about security. knowledge hubs at rami.wiki, thoughts at ramimac.me

364 Followers  |  225 Following  |  35 Posts  |  Joined: 28.02.2024  |  1.8395

Latest posts by ramimac.me on Bluesky

Post image

🚨 We scanned GitHub and found *hundreds* of valid secrets, 4 of the top 5 were AI-related:
HuggingFace, Azure OpenAI, Weights & Biases, and Groq.

Read more:
www.wiz.io/blog/leaking...

18.06.2025 13:09 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Securing open-source credentials at scale | Google Cloud Blog We’ve developed a powerful tool to scan open-source package and image files by default for leaked Google Cloud credentials. Here’s how to use it.

> We've set up a web endpoint so vetted ... security researchers can submit suspected exposed credentials for review
> To report exposed Google Cloud credentials, please contact gcp-credentials-reports@google.com

cloud.google.com/blog/product... really buried the lede!

17.06.2025 13:54 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Hardening GitHub Actions: Lessons from Recent Attacks | Wiz Blog Build resilient GitHub Actions workflows with insights from real attacks, missteps to avoid, and security tips GitHub’s docs don’t fully cover.

In light of recent GitHub Actions incidents (Ultralytics, tj-actions...), I wrote up a practical guide to hardening for @wizsecurity.bsky.social

Covers permissions, secrets, 3rd-party Actions, ++

Use it to avoid learning these lessons the hard way:
www.wiz.io/blog/github-...

05.05.2025 15:45 β€” πŸ‘ 7    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
MCP and LLM Security Research Briefing | Wiz Blog Explore the evolving Model Context Protocol (MCP), its security risks, and how to prepare for safe adoption as LLMs connect to external systems.

Synthesized 20+ sources and internal @wizsecurity.bsky.social expertise to come out with a comprehensive guide to MCP security

Today's options, and tomorrow's possibilities

www.wiz.io/blog/mcp-sec...

17.04.2025 14:50 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound Podcast Episode Β· Crying Out Cloud Β· 04/09/2025 Β· 29m

πŸŽ™οΈ New episode!
Our own @ramimac.me helps dive into GitHub supply chain attacks, IngressNightmare, and Oracle breach rumors.

Tune in for the latest cloud security insights!
🎧 podcasts.apple.com/us/podcast/q...

09.04.2025 11:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
CloudTrail Network Activity Events for AWS VPC Endpoints | Wiz Blog How AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

It's been awesome getting to team up with @ramimac.me to dig into a new AWS feature! Read our thoughts on AWS's new CloudTrail network activity events (aka VPC endpoint logs): www.wiz.io/blog/aws-vpc...

20.03.2025 15:45 β€” πŸ‘ 9    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub Action supply chain attack: reviewdog/action-setup | Wiz Blog A supply chain attack on tj-actions/changed-files leaked secrets. Wiz Research found another attack on reviewdog/actions-setup, possibly causing the compromise.

Turns out when you investigate a compromised Github Actions you ... find another compromised Github Action:

www.wiz.io/blog/new-git...

17.03.2025 22:16 β€” πŸ‘ 15    πŸ” 9    πŸ’¬ 1    πŸ“Œ 0

Very fun to help put final polish on this report in week 3 at Wiz - anecdata is fun, data is funner :)

06.02.2025 19:19 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
πŸ§™ Why I’m Joining Wiz I’m joining the leading cloud security startup, hoping to β€œwork for the Security Industry, at Wiz.”

New year, new job!

I've joined the amazing @wiz_io research team

My goal is the "work for the security industry, at Wiz"

I wrote a blog post explaining why, and what that means:
ramimac.me/joining-wiz

28.01.2025 15:01 β€” πŸ‘ 33    πŸ” 4    πŸ’¬ 3    πŸ“Œ 0
Preview
How to Say β€œNo” Well Security’s pivot from β€˜Department of No’ to β€˜Department of Yes’ misses the real lesson - how to say β€˜No’ the right way.

Lately, every BSides seems to have a talk on reframing security teams as a β€œDepartment of Yes”

We don’t hear nearly as much about the value of a well-considered, strategically deployed β€œNo”

I've pulled together guidance on giving a better, more constructive No:
ramimac.me/saying-no

30.12.2024 15:08 β€” πŸ‘ 21    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0
Post image

Keep an eye out for notices - AWS RDS Protection for Guardduty seems to have had some issues collecting logs.

Unclear how pervasive this was!

26.12.2024 11:43 β€” πŸ‘ 7    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
Poisoning the SSM Command Document Well Responsibly disclosing risks in using SSM Command Docs for software distribution.

reminds me of ramimac.me/poisoning-ss... πŸ˜‰

24.12.2024 12:12 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
State of β€˜State of Cloud Security’ Reports: Insights or Self-Owns? Dozens of hours reading State of Cloud Security reports that I think miss the mark.

One recent report highlighted that roughly a third of their customers have β€œat least one cloud workload that is publicly exposed, critically vulnerable and highly privileged.”

If you’re this vendor, should I really buy your product?

ramimac.me/state-of-clo...

18.12.2024 16:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

I've spent dozens of hours reading State of Cloud Security reports

You know, the ones that use data from their CSPM product

And I've realized the findings substantially reflect how well that tool helps customers secure their clouds

I wrote up some examples, both good and bad (πŸ”— in 🧡)

18.12.2024 16:50 β€” πŸ‘ 8    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
β€œFounder Mode” and the Art of Mythmaking I’ve never been good at β€œhot takes”. Anyone who knows anything about marketing can tell you that the best time to share your opinion about something is when everyone is all worked up about it. Hot …

I (finally) wrote up my thoughts on "Founder Mode" and the Brian Chesky morality tale about how he turned around Airbnb company culture.

This has made it into the Silicon Valley water table; it must be dealt with. There are some good nuggets within; let's dig them out.

charity.wtf/2024/12/17/f...

17.12.2024 17:56 β€” πŸ‘ 297    πŸ” 96    πŸ’¬ 26    πŸ“Œ 37

www.cybok.org/media/downlo...

18.12.2024 10:43 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

New Threat Vector Unlocked

1. Find the Crunchbase page of a cybersecurity company that just raised VC funding
2. Change the page details (which anyone with a Crunchbase account can do) to a personal CashApp page
3. ????
4. Profit! (?)

09.12.2024 14:45 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
A decade of defense: securing the largest US crypto exchange | Philip Martin |  MSSN CTRL 2024
YouTube video by LimaCharlie A decade of defense: securing the largest US crypto exchange | Philip Martin | MSSN CTRL 2024

Somehow <50 people have caught this talk from Coinbase's CSO??

His core advice:
1. Make lives easier - e.g roll out yubikeys
2. Define Security Invariants
3. Plan & Practice IR
4. Balance Risks & Threats
5. Security is a People Problem - use focus groups for new controls!

youtu.be/BPh4Hc3TH74

09.12.2024 12:23 β€” πŸ‘ 12    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Just keep dm'ing them to me so I can bully you into publishing 😈

09.12.2024 11:14 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Interesting research out of AWS!

> IAM-PolicyRefiner, a tool that automatically synthesizes refined AWS IAM access control policies from access logs

> fast (<5s per policy), effective and does not overfit

Not open source, but maybe a sign of things to come?

assets.amazon.science/cf/bc/58e56f...

01.12.2024 13:15 β€” πŸ‘ 7    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

IIRC, re:Inforce was a bust for security announcements.

I wish some of these announcements got time center stage there, versus being pre:Invent announcements now.

Hopefully re:Invent makes space alongside the GenAI noise!

21.11.2024 10:45 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

I've been chatting a lot re:when to make the first security hire" recently

I've come up with a Rule of Thumb:
Hire your first security person when security is an unavoidable distraction from scaling your business

ramimac.me/start-security

h/t @grims.bsky.social & @mag00.bsky.social

20.11.2024 16:20 β€” πŸ‘ 10    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

This webinar will be more relay-race than sparring match when it's with folks like @nanook.bsky.social and @jamesberthoty.bsky.social!

19.11.2024 06:55 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Don’t click: towards an effective anti-phishing training. A comparative literature review - Human-centric Computing and Information Sciences Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many ...

I think it's pretty easy to dig up research that ties phishing simulations to a decrease in metrics like Click Through Rate or improvement in "awareness" - but I'd argue those aren't the metrics that matter!
Ex. hcis-journal.springeropen.com/articles/10....

18.11.2024 17:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
CSDL | IEEE Computer Society

I love when new research comes out to back up my "phishing training is bad practice" priors:

www.computer.org/csdl/proceed...

I track the latest evidence against phishing simulations: rami.wiki/phishing-sim...

18.11.2024 16:09 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 2    πŸ“Œ 0
Preview
Platform Engineering Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of a...

Wondering β€œWhat Does Success Look Like?”

Check out the book!

There is incredible depth, detail, and color provided that I can only hint at in this format: www.oreilly.com/library/view...

Thank you to Camille and Ian for sharing their expertise

18.11.2024 11:58 β€” πŸ‘ 7    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

β€œSaying β€œNo” Without Ruining the Relationship”

- β€œNot yet, priority call” β†’ give options and how they can help
- β€œNot yet, technical call” β†’ take time to explain the details
- β€œNo, product strategy call” β†’ accept shadow IT or alternative platforms
- β€œNo, technical call” β†’ beware magical thinking

18.11.2024 11:55 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
high power + low interest = keep satisfied
low power + low interest = monitor with minimum effort
high power + high interest = manage closely
low power + high interest  = keep informed

high power + low interest = keep satisfied low power + low interest = monitor with minimum effort high power + high interest = manage closely low power + high interest = keep informed

Use the handy-dandy power-interest grid to prioritize stakeholder management!

18.11.2024 11:54 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

πŸ“¦ Tips & Tricks for Migrations

* Minimize Glue and Limit Variation
* Transparent Migrations
* Usage Metadata
* Automate as much as possible
* Focus documentation on on-ramps and off-ramps

18.11.2024 11:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

β€œIf you don’t end up regretting your early technology decisions, you probably overengineered. -Randy Schoup”

Don't do a v2 (Pioneer mindset, new features, and scale don't mix!), just change the plane's engine in midair.

Rearchitect with a focus on β€œreliability, features, efficiency, and security”

18.11.2024 11:42 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@ramimac.me is following 20 prominent accounts