PØ LABS: RESEARCH FROM THE BATTLE FRONT
The threat researchers in PØ Labs watch incidents live, as they occur. Working right on the front lines of cloud threat, we can learn more than anyone else about the latest techniques of adversaries. And we when see something new, we’re very transparent.
LUCR-3: Scattered Spider Getting SaaS-y in the Cloud
Ian Ahl | 09.20.23
LATEST CLOUD-SHAKING INSIGHTS
Permiso Releases Suite of Open-Source Tools to Bolster Detection Capabilities for Past,Present and Future Attacks
Release Marks Ten Open-Source Tools the Startup Has Launched So Far This Year PALO ALTO, CA – November 7, 2024 - Permiso, the leader in real-time identity security, has released a suite of three open-source tools that help security teams bolster
INTRODUCING CAPICHE DETECTION FRAMEWORK: AN OPEN-SOURCE TOOL TO SIMPLIFY CLOUD API-BASED HUNTING
Intro Attacks on cloud infrastructure have been steadily increasing in quantity, sophistication and scope. Common cryptomining attacks still exists, but the proliferation of BEC (Business Email Compromise) and SMS spamming along with full-bore
BucketShield: Track Log Flow, Secure Buckets, Simulate Threats – All in One Open-Source Tool
Introduction In today’s cloud-powered world, keeping your logs secure and intact is more important than ever. AWS CloudTrail serves as the backbone for tracking all activities across your cloud environment, but simply enabling it isn't enough.
CLOUD INCIDENT RESPONSE
cloud Infrastructure Paranoia?
Get a free first consultation with the PØ Labs team, led by former Mandiant incident responders. See how PØ Labs identifies compromised infrastructure and helps you respond.
CLOUD COMPROMISE ASSESSMENT
See Who’s Cloud-Lurking Now
PØ Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.
YOUR FRONT-LINE RESEARCH TEAM
Daniel Bohannon
Principal Threat Researcher
UGA B.S. CompSci, Georgia Tech M.S. InfoSec, 13+ years IR & researcher roles including Mandiant Advanced Practices Team & Microsoft, OpenSource tool developer (e.g. Invoke-Obfuscation)
My favorite dessert is a lavender latte - to be enjoyed during or between any meal of the day
Andrew Kraut
Senior Threat Researcher
Born with a screwdriver in his hand, Andy has been digging into the internals of technology since he opened his eyes and in the security industry since the era of dial-up. Proudly a generalist, Andy has turned his hand at a wide swath of security industry focuses on both the offensive and defensive sides over the last 25 years. When he’s not breaking systems and questioning assumptions, you can find him suspiciously connecting his laptop to things, pushing buttons that say “Do not press,” biking mountains, and climbing rocks.
My favorite dessert is chocolate marshmallow churro fries (from Award Weiners at Disney’s California Adventure).
Guido Besomi
Data Scientist
I’m a mathematical engineer from Universidad de Chile. When I started my data science journey I was a mathematician more than anything else, after 6 years of working on applied problems I’m proud to say I’ve earned the “engineering” part of my degree.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Andi Ahmeti
Associate Threat Researcher
Experienced Computer Engineering senior student with a 6-month internship as a Security Engineer. Passionate about cybersecurity and skilled in software development, hardware design, and system architecture.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Abian Morina
Associate Threat Researcher
Computer Science and Engineering student specializing in Information Security and Assurance. 1+ year of experience as a Penetration Tester/Bounty Hunter.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Enisa Hoxhaxhiku
Associate Threat Researcher
Highly motivated and proactive Computer Science and Engineering student deeply passionate about Information Security and Cybersecurity. Interned in Information Security, actively engaging in red team and blue team activities. Possesses a strong analytical mindset and attention to detail.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Art Ukshini
Associate Threat Researcher
Experienced Cyber Security Engineer with a background in Computer Engineering studies. Highly passionate on Offensive Security & with a strategic approach on Defensive Security & Threat Research.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Dredhza Braina
Associate Threat Researcher
Computer engineering graduate with experience as a Software Engineer and DevSecOps Engineer/SRE. Focused on threat research and deeply dedicated to cybersecurity.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Ela Dogjani
Associate Threat Researcher
Senior Software Engineering student at Canadian Institute of Technology, Albania. Began tech journey at 14 with STEM trainings. Now exploring security, excited for Permiso internship.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Hear Ye, Hear Ye
Subscribe to Cloud Chronicles for the latest in cloud security!