Our Cloud Heroes

Ian Ahl
VP of P0 Labs

Joshua Gauthier
Senior Threat Researcher

Nathan Eades
Threat Researcher

Andrew Kraut
Senior Threat Researcher
Latest Musings
Anatomy of an Attack: Exposed keys to Crypto Mining
At Permiso, we find that the majority of incidents we discover or respond to, start with exposed access keys. Attackers leverage these keys to gain access, then setup a mechanism to establish persistence, perform reconnaissance, and complete their mission.
READ MORE

Cloud vendor supply chain risk - Forecast: Foggy with a chance of thunderstorms
Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of cloud vendors.
READ MORE

Cloud Incident Response
do you think your cloud infrastructure has been compromised?
P0 Labs can identify and help you respond to attacks. The team, led by former Mandiant incident responders, will conduct a first consultation for free.

Cloud Compromise Assessment
do you know who’s lurking in your cloud?
P0 Labs can give you a full rundown of who’s in your environment, what they’ve been doing, and if you should be worried. Best case, there’s nothing to worry about.