PØ LABS: RESEARCH FROM THE BATTLE FRONT
The threat researchers in PØ Labs watch incidents live, as they occur. Working right on the front lines of cloud threat, we can learn more than anyone else about the latest techniques of adversaries. And we when see something new, we’re very transparent.
LUCR-3: Scattered Spider Getting SaaS-y in the Cloud
Ian Ahl | 09.20.23
LATEST CLOUD-SHAKING INSIGHTS
Product Update: IP and Code Threat Detection Now Available for GitHub and Atlassian’s Suite of Products, Including Confluence and Jira
Most organizations are unaware of how large their cloud identity attack surface is, specifically as it relates to the high number of human and non-human that exist in a typical environment. Many organizations are also unable accurately determine
When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying
Key Takeaways Attacks against GenAI Infrastructure like AWS Bedrock have increased substantially over the last six (6) months. Particularly with exposed access keys. Attackers are hijacking victim GenAI infrastructure to power their own LLM
Permiso Universal Identity Graph: Why Universal Identity Is Key to Solving Security Siloes
Permiso Security is excited to announce the release of the Universal Identity Graph, providing identity security risk visibility for all entity identities, including human and non-human, across all environments.
CLOUD INCIDENT RESPONSE
cloud Infrastructure Paranoia?
Get a free first consultation with the PØ Labs team, led by former Mandiant incident responders. See how PØ Labs identifies compromised infrastructure and helps you respond.
CLOUD COMPROMISE ASSESSMENT
See Who’s Cloud-Lurking Now
PØ Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.
YOUR FRONT-LINE RESEARCH TEAM
Daniel Bohannon
Principal Threat Researcher
UGA B.S. CompSci, Georgia Tech M.S. InfoSec, 13+ years IR & researcher roles including Mandiant Advanced Practices Team & Microsoft, OpenSource tool developer (e.g. Invoke-Obfuscation)
My favorite dessert is a lavender latte - to be enjoyed during or between any meal of the day
Andrew Kraut
Senior Threat Researcher
Born with a screwdriver in his hand, Andy has been digging into the internals of technology since he opened his eyes and in the security industry since the era of dial-up. Proudly a generalist, Andy has turned his hand at a wide swath of security industry focuses on both the offensive and defensive sides over the last 25 years. When he’s not breaking systems and questioning assumptions, you can find him suspiciously connecting his laptop to things, pushing buttons that say “Do not press,” biking mountains, and climbing rocks.
My favorite dessert is chocolate marshmallow churro fries (from Award Weiners at Disney’s California Adventure).
Guido Besomi
Data Scientist
I’m a mathematical engineer from Universidad de Chile. When I started my data science journey I was a mathematician more than anything else, after 6 years of working on applied problems I’m proud to say I’ve earned the “engineering” part of my degree.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Andi Ahmeti
Associate Threat Researcher
Experienced Computer Engineering senior student with a 6-month internship as a Security Engineer. Passionate about cybersecurity and skilled in software development, hardware design, and system architecture.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Abian Morina
Associate Threat Researcher
Computer Science and Engineering student specializing in Information Security and Assurance. 1+ year of experience as a Penetration Tester/Bounty Hunter.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Enisa Hoxhaxhiku
Associate Threat Researcher
Highly motivated and proactive Computer Science and Engineering student deeply passionate about Information Security and Cybersecurity. Interned in Information Security, actively engaging in red team and blue team activities. Possesses a strong analytical mindset and attention to detail.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Art Ukshini
Associate Threat Researcher
Experienced Cyber Security Engineer with a background in Computer Engineering studies. Highly passionate on Offensive Security & with a strategic approach on Defensive Security & Threat Research.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Dredhza Braina
Associate Threat Researcher
Computer engineering graduate with experience as a Software Engineer and DevSecOps Engineer/SRE. Focused on threat research and deeply dedicated to cybersecurity.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Ela Dogjani
Associate Threat Researcher
Senior Software Engineering student at Canadian Institute of Technology, Albania. Began tech journey at 14 with STEM trainings. Now exploring security, excited for Permiso internship.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Hear Ye, Hear Ye
Subscribe to Cloud Chronicles for the latest in cloud security!