STATE OF IDENTITY SECURITY Permiso has released the 2024 Survey Report

[GET THE REPORT]

The Human Touch In Creating & Securing Non-Human Identities

[GET THE EBOOK]

PØ LABS: RESEARCH FROM THE BATTLE FRONT

The threat researchers in PØ Labs watch incidents live, as they occur. Working right on the front lines of cloud threat, we can learn more than anyone else about the latest techniques of adversaries. And we when see something new, we’re very transparent.

PØ LABS

LATEST CLOUD-SHAKING INSIGHTS

What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs

Earlier this week, Rippling announced that it had filed a lawsuit against one of their biggest competitors, Deel. The lawsuit alleges that Deel had placed a ‘spy’ within Rippling in order to harvest confidential sales and business strategy data from

Azure's Apex Permissions: Elevate Access & The Logs Security Teams Overlook

Azure's "Elevate Access" feature is a critical security control point that deserves more comprehensive technical coverage than it typically receives. At Permiso, our P0 Labs team brings diverse cloud security expertise, including deep knowledge of

RansomWhen??? I Never Even Noticed It…

A successful ransomware attack is the culmination of numerous steps performed by a determined attacker: gaining initial access to the victim’s environment, enumerating privileges to identify sensitive data, escalating privileges to gain access to

View more posts
illustration-cloud-bottom-2

CLOUD INCIDENT RESPONSE

cloud Infrastructure Paranoia?

Get a free first consultation with the PØ Labs team, led by former Mandiant incident responders. See how PØ Labs identifies compromised infrastructure and helps you respond.

CLOUD INCIDENT RESPONSE

CLOUD COMPROMISE ASSESSMENT

See Who’s Cloud-Lurking Now

PØ Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.

CLOUD COMPROMISE ASSESSMENT
Cloud

YOUR FRONT-LINE RESEARCH TEAM

Ian Ahl

Ian Ahl

SVP of Threat Research

20+ years of experience starting in the USMC, 8 Years Mandiant IR and Advanced Practices: tracking, detecting, and responding to nation state threat actors.

My favorite dessert is warm dark chocolate brownies with vanilla ice cream and some chocolate drizzle!

Daniel Bohannon

Daniel Bohannon

Principal Threat Researcher

UGA B.S. CompSci, Georgia Tech M.S. InfoSec, 13+ years IR & researcher roles including Mandiant Advanced Practices Team & Microsoft, OpenSource tool developer (e.g. Invoke-Obfuscation)

My favorite dessert is a lavender latte - to be enjoyed during or between any meal of the day

Nathan Eades

Nathan Eades

Director of Adversary Detection

RMU B.S. CIS, RMU M.S. InfoSec, 8+ years in IT with roles in software development, cybersecurity consulting, data loss prevention, threat detection and threat research

I cannot insult the other desserts by choosing one.

Isuf Deliu

Isuf Deliu

Threat Research Manager

Computer engineer with 8 years of experience in various aspects of Blue Teaming, including monitoring, detection, incident response, digital forensics, and threat intelligence.

I cannot insult the other desserts by choosing one.

Guido Besomi

Guido Besomi

Data Scientist

I’m a mathematical engineer from Universidad de Chile. When I started my data science journey I was a mathematician more than anything else, after 6 years of working on applied problems I’m proud to say I’ve earned the “engineering” part of my degree.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Morris

Morris Hsieh

Associate Data Scientist

Data Science grad from Columbia University, excited to bring ML and LLM to business products. Passionate about drawing insights from big data. Easy-going, optimistic, and always curious!

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Bleon Proko

Bleon Proko

Threat Researcher

4 years on IT and cyber security working in Telecommunication, MSP, and Bank.

I tend to not eat sweets, but if I had to choose, trilece.

Andi Ahmeti

Andi Ahmeti

Threat Researcher

Experienced Computer Engineering senior student with a 6-month internship as a Security Engineer. Passionate about cybersecurity and skilled in software development, hardware design, and system architecture.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Abian Morina

Abian Morina

Threat Researcher

Computer Science and Engineering student specializing in Information Security and Assurance. 1+ year of experience as a Penetration Tester/Bounty Hunter.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Enisa Hoxhaxhiku

Enisa Hoxhaxhiku

Threat Researcher

Highly motivated and proactive Computer Science and Engineering student deeply passionate about Information Security and Cybersecurity. Interned in Information Security, actively engaging in red team and blue team activities. Possesses a strong analytical mindset and attention to detail.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Art Ukshini

Art Ukshini

Threat Researcher

Experienced Cyber Security Engineer with a background in Computer Engineering studies. Highly passionate on Offensive Security & with a strategic approach on Defensive Security & Threat Research.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Dredhza Braina

Dredhza Braina

Threat Researcher

Computer engineering graduate with experience as a Software Engineer and DevSecOps Engineer/SRE. Focused on threat research and deeply dedicated to cybersecurity.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Ela Dogjani

Ela Dogjani

Associate Threat Researcher

Senior Software Engineering student at Canadian Institute of Technology, Albania. Began tech journey at 14 with STEM trainings. Now exploring security, excited for Permiso internship.

My favorite dessert is any and all combinations of coffee and chocolate. I enjoy coffee in my chocolate and chocolate in my coffee.

Hear Ye, Hear Ye

Subscribe to Cloud Chronicles for the latest in cloud security!