Embedding Deception into Cloud CI/CD Pipelines
When ‘Contributor’ Means Control: The Hidden Risk in Azure RBAC
Pass-the-Role Attack – From Legit to Lethal
Turning the Cloud Against the Attacker – Using Deception to Uncover and Disrupt Attackers
The Threat You Didn’t See Coming – Data Exfiltration
Cloud Enumeration: The Stealthy Discovery Process in AWS
Unseen but Deadly: How Forgotten S3 Buckets Become Breach Gateways
Databricks Webhooks: A Silent Backdoor for Malicious Execution
Shadow Operations: Unraveling the Secrets of AWS SSM
From Credentials to Control: Exploiting AWS RDS