PØ LABS: RESEARCH FROM THE BATTLE FRONT
The threat researchers in PØ Labs watch incidents live, as they occur. Working right on the front lines of cloud threat, we can learn more than anyone else about the latest techniques of adversaries. And when we see something new, we’re very transparent.


LUCR-3: Scattered Spider Getting SaaS-y in the Cloud
Ian Ahl | 09.20.23



LATEST CLOUD-SHAKING INSIGHTS
Visibility + Context + Continuous Assessment = Effective Identity Security Posture Management (ISPM)
Modern security teams aren’t short on tools; they’re short on clarity. Identity lives across IdPs, cloud accounts, SaaS apps, data stores, CI/CD, and secrets vaults. Each system emits alerts, but few explain which identities can reach what and how
P0LR Espresso - Pulling Shots of Cloud Live Response & Advanced Analysis
In today’s detection landscape, defenders are overwhelmed by pre-canned dashboards and visualizations that are often aesthetically pleasing but lack actionable insight. While triaging suspicious activity, it is not often that these tools succinctly
Permiso Delivers Complete AI Security Through Unified Identity Platform
The speed of artificial intelligence adoption is unprecedented. From automating code generation to powering customer service, AI is no longer a strategic option but a business imperative. Yet, with this rapid integration comes a new, expansive

CLOUD INCIDENT RESPONSE
cloud Infrastructure Paranoia?
Get a free first consultation with the PØ Labs team, led by former Mandiant incident responders. See how PØ Labs identifies compromised infrastructure and helps you respond.

CLOUD COMPROMISE ASSESSMENT
See Who’s Cloud-Lurking Now
PØ Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.


YOUR FRONT-LINE RESEARCH TEAM


Daniel Bohannon
Principal Threat Researcher
UGA B.S. CompSci, Georgia Tech M.S. InfoSec, 13+ years IR & researcher roles including Mandiant Advanced Practices Team & Microsoft, OpenSource tool developer (e.g. Invoke-Obfuscation)
My favorite dessert is a lavender latte - to be enjoyed during or between any meal of the day



Guido Besomi
Data Scientist
I’m a mathematical engineer from Universidad de Chile. When I started my data science journey I was a mathematician more than anything else, after 6 years of working on applied problems I’m proud to say I’ve earned the “engineering” part of my degree.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Morris Hsieh
Associate Data Scientist
Data Science grad from Columbia University, excited to bring ML and LLM to business products. Passionate about drawing insights from big data. Easy-going, optimistic, and always curious!
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Andi Ahmeti
Threat Researcher
Experienced Computer Engineering senior student with a 6-month internship as a Security Engineer. Passionate about cybersecurity and skilled in software development, hardware design, and system architecture.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Abian Morina
Threat Researcher
Computer Science and Engineering student specializing in Information Security and Assurance. 1+ year of experience as a Penetration Tester/Bounty Hunter.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Enisa Hoxhaxhiku
Threat Researcher
Highly motivated and proactive Computer Science and Engineering student deeply passionate about Information Security and Cybersecurity. Interned in Information Security, actively engaging in red team and blue team activities. Possesses a strong analytical mindset and attention to detail.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Art Ukshini
Threat Researcher
Experienced Cyber Security Engineer with a background in Computer Engineering studies. Highly passionate on Offensive Security & with a strategic approach on Defensive Security & Threat Research.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Dredhza Braina
Threat Researcher
Computer engineering graduate with experience as a Software Engineer and DevSecOps Engineer/SRE. Focused on threat research and deeply dedicated to cybersecurity.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Gerald Leba
Threat Researcher
Cybersecurity Engineer with a solid foundation in Computer Science, specializing in Offensive Security and Threat Intelligence. Possesses a strategic focus on advanced threat research and analysis.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Ela Dogjani
Associate Threat Researcher
Senior Software Engineering student at Canadian Institute of Technology, Albania. Began tech journey at 14 with STEM trainings. Now exploring security, excited for Permiso internship.
My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.
Hear Ye, Hear Ye
Subscribe to Cloud Chronicles for the latest in cloud security!