The One-Line Backdoor: How a Single EventBridge Rule Becomes an Attacker’s Control Channel
Shadow Access in AWS – Federation Attacks with Temporary STS Tokens
Forgotten Keys, Open Clouds: The Danger of Credentials Lost in SaaS
From Denials to Breach: Detecting MFA Exploitation
Embedding Deception into Cloud CI/CD Pipelines
Pass-the-Role Attack – From Legit to Lethal
Turning the Cloud Against the Attacker – Using Deception to Uncover and Disrupt Attackers
The Threat You Didn’t See Coming – Data Exfiltration
Unseen but Deadly: How Forgotten S3 Buckets Become Breach Gateways
Shadow Operations: Unraveling the Secrets of AWS SSM