Our Cloud Heroes
VP of P0 Labs
Senior Threat Researcher
Anatomy of an Attack: Exposed keys to Crypto Mining
At Permiso, we find that the majority of incidents we discover or respond to, start with exposed access keys. Attackers leverage these keys to gain access, then setup a mechanism to establish persistence, perform reconnaissance, and complete their mission.
Cloud vendor supply chain risk - Forecast: Foggy with a chance of thunderstorms
Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of cloud vendors.
Cloud Incident Response
do you think your cloud infrastructure has been compromised?
P0 Labs can identify and help you respond to attacks. The team, led by former Mandiant incident responders, will conduct a first consultation for free.
Cloud Compromise Assessment
do you know who’s lurking in your cloud?
P0 Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.