ConsentFix: Abusing Azure OAuth Consent to Take Over Microsoft Accounts
The One-Line Backdoor: How a Single EventBridge Rule Becomes an Attacker’s Control Channel
Lateral Movement via External GCP Service Accounts
Shadow Access in AWS – Federation Attacks with Temporary STS Tokens
Forgotten Keys, Open Clouds: The Danger of Credentials Lost in SaaS
The Ghost Session Problem: The Real Persistence Threat in Azure AD
Exploiting Identity in Azure: The Real Impact of Pass-the-Token Attacks
From Denials to Breach: Detecting MFA Exploitation
From Shell to Cloudshell: The Escalation Path Attackers Use After VM Breach
Embedding Deception into Cloud CI/CD Pipelines