research
January 19, 2024
Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining
research
January 10, 2024
From IRC to Instant Messaging: The Rise of Malware Communication via Chat Platforms
writing
October 27, 2023
The Kubernetes CVE-2023-3676 Windows command injection vulnerability - exploitation and prevalence
emerging vulnerabilities
October 13, 2023
The Confluence CVE-2023-22515 vulnerability: Overview, detection, and remediation
research
October 11, 2023
Following attackers’ (Cloud)trail in AWS: Methodology and findings in the wild
writing
May 16, 2023
Attacking and securing cloud identities in managed Kubernetes part 1: Amazon EKS
emerging vulnerabilities
May 10, 2023
The OverlayFS vulnerability CVE-2023-0386: Overview, detection, and remediation
open source
March 30, 2023
Identify and remediate common cloud risks with the Datadog Cloud Security Atlas
open source software
February 14, 2023
Announcing GuardDog 1.0, with npm support, new heuristics, and easier CI integration
research
February 6, 2023
Discovering a weakness leading to a partial bypass of the login rate limiting in the AWS Console
research
December 21, 2022
A retrospective on public cloud breaches of 2022, with Rami McCarthy and Houston Hopkins
writing
December 1, 2022
Attacker persistence in Kubernetes using the TokenRequest API: Overview, detection, and prevention
emerging vulnerabilities
November 23, 2022
Investigating a backdoored PyPi package targeting FastAPI applications
open source software
November 15, 2022
Finding malicious PyPI packages through static code analysis: Meet GuardDog
emerging vulnerabilities
November 1, 2022
The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation
research
October 11, 2022
Improving your AWS Security posture: Key learnings from the State of AWS Security study
open source software
August 13, 2022
Introducing Threatest, a CLI and Go framework for end-to-end testing of threat detection rules
emerging vulnerabilities
June 7, 2022
The Confluence RCE vulnerability (CVE-2022-26134): Overview, detection, and remediation
emerging vulnerabilities
April 1, 2022
The Spring4Shell vulnerability: Overview, detection, and remediation
emerging vulnerabilities
January 28, 2022
The PwnKit vulnerability: Overview, detection, and remediation
emerging vulnerabilities
January 28, 2022
The Dirty Pipe vulnerability: Overview, detection, and remediation
emerging vulnerabilities
December 14, 2021
The Log4j Log4Shell vulnerability: Overview, detection, and remediation
work with us
We're always looking for talented people to collaborate with
featured positions
-
Enterprise IT Security Engineer
Security - Engineering
-
Azure Security Researcher
Security - Engineering
-
Business Continuity and Disaster Recovery Governance Analyst
Security - Engineering
-
Detection Engineer 2 - Cloud SIEM
Security - Engineering
-
Detection Engineer 2 - Cloud SIEM - NorAm
Security - Engineering
-
Detection Engineer 2 - CSM
Security - Engineering
We have 12 positions
view all