Posts by Category

ai

Leaking Secrets in the Age of AIWiz

How has AI-assisted development impacted secrets leakage?

Rules Files for Safer Vibe CodingWiz

Vibe coding with AI is fast, but how can we make it safer

Research Briefing: MCP SecurityWiz

The present and future of security for the Model Context Protocol.

cicd

Five new facts about the tj-actions attack

Infographic with five new facts about the tj-actions attack.

How to Harden GitHub Actions: The Unofficial GuideWiz

Build resilient GitHub Actions workflows with lessons from recent attacks.

New GitHub Action supply chain attack: reviewdog/action-setupWiz

Disclosure and discussion of CVE-2025-30154 in action-setup.

cloudsec

The Forensic Trail On GitHub: Hunting For Supply Chain Activity

A comprehensive methodology for investigating and tracking real-world supply chain attacks exploiting GitHub Actions

And I Would've Gotten Away With It, Too, If It Wasn't For You Meddling Researchers

Using the tj-actions/changed-files incident to expose the raw reality of rapid response research in cloud security

You Are Not Netflix: How to learn from conference talks

Tips and tricks for handling the fact that conference talks and engineering blogs are often quilted from small omissions and half-truths.

Scale Security Programs with Scorecarding

A talk expanding on the ideas first shared in ramimac.me/scorecarding

How to use CloudTrail network activity events for AWS VPCeWiz

Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

How to 10X Your Cloud Security (Without the Series D)

A dense, practical walkthrough of scaling cloud security programs, distilled from the best talks and posts out there

FinOps 🤝 Security

Cloud Security's overlap with FinOps benefits.

Eleventeen ways to delete an AWS resourceAWS Security Digest

Exploring the many (many) ways you can delete resources in AWS

The Security Canary Maturity ModelTracebit

A framework for understanding where your organization sits in its security canary journey

Industrial IAM Service Role Creation

A guide to tools for creating AWS IAM service roles.

An AWS IAM Security Tooling Reference

A guide to tools for auditing AWS IAM.

Canary Infrastructure vs. Real World TTPsTracebit

Breaking down three sophisticated cloud threat actors and how canary infrastructure could detect them, with diagrams

Poisoning the SSM Command Document Well

Responsibly disclosing risks in using SSM Command Docs for software distribution.

A hard look at GuardDuty shortcomingsTracebit

Examining why GuardDuty alone probably isn't enough for AWS threat detection

Thwacking DDOS with AWS WAF

AWS WAF is definitely not the best DDOS prevention tech on the market. But if you're ever in the seat and it's the tool you have, here's your guide.

Minor security disclosure in RDS Snapshot Public SharingTwitter

Documenting a minor AWS vulnerability where the RDS snapshot public sharing confirmation checkbox wasn't actually enforced

Publicly Exposed AWS SSM Command Documents

An analysis of the thousands of public SSM Command documents, including identification of secret leakage.

AWS OIDC Provider Enumeration

Expanding on Nick Frichette's discovery of enumerable OIDC providers in AWS using the known_aws_accounts dataset.

Publicly Exposed AWS Document DB Snapshots

Deep dive into publicly exposed AWS DocumentDB snapshots, including a disclosure affecting millions of Cinemark customers

Semgrep for Terraform Security

How to use Semgrep for Terraform security - from evangelizing secure-by-default modules to catching subtle IaC footguns

Intentionally Leaking AWS Access Keys - GitLab

What happens when you leak AWS keys on GitLab instead of GitHub? Spoiler - nobody cared

The state of ABAC on AWS (in 2024)

Revisiting Scott Piper's 2020 analysis of AWS ABAC - things are only a little better

Did your research: Prior Art for "15 ideas for cloud security research"

A curated set of references to bootstrap your work on any of Daniel Grzelak's 15 cloud security research ideas

Steampipe + Access Advisor

Use Steampipe queries to identify and reduce over-privileged IAM permissions with Access Advisor

Quick Tip: Minimizing Terraformed SCPs

A simple Terraform trick to minify SCPs and stay under AWS character limits

AWS SES Verification Phishing: A Fifth Way

Introducing a fifth AWS-specific phishing attack via SES email verification

Beyond the Baseline: Horizons for Cloud Security Programs

A rapid fire tour of problems you'll encounter scaling a cloud security program past Scott Piper's AWS Security Maturity Roadmap

Risk in AWS SSM Port Forwarding

A surprising SSM default that can grant shell access when you only intended port forwarding

Shipping RDS IAM Authentication (with a bastion host & SSM)

A practical walkthrough for setting up RDS IAM Authentication with a bastion host and SSM port forwarding

Beyond the AWS Security Maturity Roadmap

A rapid fire tour of problems you'll encounter scaling a cloud security program, with opinions on build vs buy

A Guide to S3 Logging

Practical guidance on when to use S3 Access Logs vs CloudTrail Data Events, and how to operationalize each

Reducing Attack Surface with AWS Allowlisting

How to use Service Control Policies to allowlist AWS regions and services, dramatically reducing attack surface

AWS Lambda Risks and Threats

A refresher on the risks and threat model of AWS Lambda

AWS Could Do More About SSO Device Auth Phishing

A look at what AWS could (and should) do to harden their SSO device code authentication flow against phishing

AWS Phishing: Four Ways

Four AWS-specific phishing vectors beyond commodity credential theft, including SSO device code and CloudFormation attacks

Cloud Security Orienteeringtl;dr sec

Written companion to my DEFCON Cloud Village talk on getting your bearings in novel cloud environments

Cloud Security Orienteering

A methodology for rapidly orienting yourself in unfamiliar cloud environments and prioritizing the risks that matter

Learning from AWS (Customer) Security Incidents

A BSidesCT talk analyzing over a dozen public AWS breaches, common root causes, and how to proactively secure your environment

AWS Security - Easy Wins and Enterprise Scale

A BSides Boston talk covering quick AWS security improvements for any organization plus big-picture considerations for enterprise environments

An AWS IAM Security Tooling Reference

A survey of open-source tools for AWS IAM security, from PMapper and Parliament for assessment to Policy Sentry and Repo Kid for maintenance

The Extended AWS Security Ramp-Up GuideNCC Group

A curated collection of the best non-Amazon resources for learning AWS security, extending the official Ramp-Up Guide

Building Castles in the Cloud: AWS Security and Self-Assessment

A BSidesCT talk on securing AWS environments, covering the shared responsibility model and open-source auditing tools like ScoutSuite

sadcloud: Templating cloud misconfigurations

Announcing sadcloud, a Terraform tool for spinning up intentionally insecure AWS environments for testing and training

AWS Cloud Security Fundamentals

A 4-hour workshop from BASC 2019 covering the AWS shared responsibility model, open-source auditing tools, and hands-on CloudGoat exercises

continuing-ed

Path to CCSK: Security Guidance v4 (Domains 1-7)

Study notes from the CSA Security Guidance covering cloud concepts, governance, legal, compliance, and infrastructure security

Path to CCSK: ENISA

Study notes from the ENISA cloud security report, covering risks, vulnerabilities, and information assurance requirements

Brandeis MS in Information Security Leadership

Why I decided to pursue a part-time online master's degree in Information Security Leadership while working full-time as a pentester

cost

FinOps 🤝 Security

Cloud Security's overlap with FinOps benefits.

Deciding on S3 Intelligent Tiering

A playbook for evaluating S3 Intelligent Tiering with napkin math, plus tips for derisking the migration

development

$ git blame 4: Quitten/Autorize

Adding a "Send Responses to Comparer" feature to the Autorize Burp extension for faster authorization testing triage

Methodology: Learn Android Application Security Testing

A rundown of Android security testing tools and methods, from Manitree and MobSF to drozer and manual testing

$ git blame 3: MobSF/Mobile-Security-Framework-MobSF

Fixing a false positive in MobSF's APK certificate analysis by checking the manifest for SHA256 usage

$ git blame 1: michenriksen/bucketlist

Adding optional flags to the S3 bucket enumeration tool for filtering private bucket output and controlling wordlist permutations

$ git blame 2: michenriksen/aquatone

A small fix to aquatone's subdomain takeover detection for CloudFront, checking both HTTP and HTTPS

iam

Industrial IAM Service Role Creation

A guide to tools for creating AWS IAM service roles.

An AWS IAM Security Tooling Reference

A guide to tools for auditing AWS IAM.

The state of ABAC on AWS (in 2024)

Revisiting Scott Piper's 2020 analysis of AWS ABAC - things are only a little better

Steampipe + Access Advisor

Use Steampipe queries to identify and reduce over-privileged IAM permissions with Access Advisor

Shipping RDS IAM Authentication (with a bastion host & SSM)

A practical walkthrough for setting up RDS IAM Authentication with a bastion host and SSM port forwarding

An AWS IAM Security Tooling Reference

A survey of open-source tools for AWS IAM security, from PMapper and Parliament for assessment to Policy Sentry and Repo Kid for maintenance

industry

State of 'State of Cloud Security' Reports: Insights or Self-Owns?

Dozens of hours reading State of Cloud Security reports that I think miss the mark.

Answering "Dumb Security Questionnaires"

Doing security well? Then here are some tricks for pushing through the security questionnaire quagmire.

The Path to Zero Touch Production

A universal theory for incrementally moving a cloud-native org to Zero Touch Prod, with AWS production access primitives

Sub-Venture Scale Security Problemstl;dr sec

Why the security industry lacks small vendors fixing undifferentiated problems, plus 5 fixable gaps for security teams

The Race to Make a Business of Secure Defaultstl;dr sec

Secure by Design is trending but we haven't seen a breakout startup - what makes selling secure defaults hard

What happened to RASP?

Walking through the history and challenges of the RASP market, and whether the new ADR acronym will fare any better

*AST and *SPM: Acquisition Magnets

Why there are so many *AST and *SPM startups, and why they keep getting acquired

Customer LoveVenture in Security

How startups can build customer love and achieve rapid growth by word of mouth

leadership

How to Say "No" Well

Security’s pivot from 'Department of No' to 'Department of Yes' misses the real lesson - how to say 'No' the right way.

The First Security Hire Rule of Thumb

When should you hire that first security person?

Scorecarding Security

A survey of approaches to scorecarding in security programs.

Tips for SOCLess OncallCrowdAlert

Practical tips for handling security alerts when you don't have a dedicated SOC

Don't Security Engineer Asymmetric Workloadstl;dr sec

Asymmetric workloads are a double-edged sword - security can add outsized costs on orgs just as orgs can on us

Challenges in Security Engineering ProgramsVenture in Security

Security Engineering is mainstream in certain circles - here's what we can learn from the challenges

Wiring a Winning Security Organizationtl;dr sec

Summarizing Wiring the Winning Organization and applying the lessons to security programs

Security is a Team Sporttl;dr sec

Cross-company collaboration in security is rarely zero sum - a practical guide and call-to-action

10 Things Your First Security Hire Shouldn’t Do

First security hire is a weird job - here's a counterfactual guide on what to avoid

security

The Forensic Trail On GitHub: Hunting For Supply Chain Activity

A comprehensive methodology for investigating and tracking real-world supply chain attacks exploiting GitHub Actions

Agentic Browser Security: 2025 Year-End ReviewWiz

Are agentic browsers the new Flash? A 2025 review of new attacks, vendor security layers, and a roadmap for navigating AI browser risks.

Snipping the Long Tail of Shai-Hulud 2.0Wiz

Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.

Shai-Hulud 2.0 Aftermath: Trends, Victimology and ImpactWiz

Shai-Hulud 2.0 supply chain attack - reviewing the infection spread, victimology, leaked secrets distribution, and community response so far.

The Sins of Security Vendor Research

I am annoyed at the common traps security vendors fall into when producing research.

Exposure Report: 65% of Leading AI Companies Found with Verified Secret LeaksWiz

How secure are top private AI companies? Find out from our scans and disclosures.

Dismantling a Critical Supply Chain Risk in VSCode Extension MarketplacesWiz

Wiz Research has uncovered 550+ secrets hiding in plain sight. We worked with Microsoft to shut the door.

Shai-Hulud: Infographic

A visual analysis of the Shai-Hulud attack.

Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing MalwareWiz

Detect and mitigate a critical supply chain compromise affecting over 100+ packages, organizations should act urgently.

And I Would've Gotten Away With It, Too, If It Wasn't For You Meddling Researchers

Using the tj-actions/changed-files incident to expose the raw reality of rapid response research in cloud security

s1ngularity's Aftermath: AI, TTPs, and Impact in the Nx Supply Chain AttackWiz

A deeper look at the Nx supply chain attack. Analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.

s1ngularity: supply chain attack leaks secrets on GitHubWiz

Detect and mitigate a critical supply chain compromise affecting the Nx NPM Package. Organizations should act urgently.

You Are Not Netflix: How to learn from conference talks

Tips and tricks for handling the fact that conference talks and engineering blogs are often quilted from small omissions and half-truths.

Leaking Secrets in the Age of AIWiz

How has AI-assisted development impacted secrets leakage?

Rules Files for Safer Vibe CodingWiz

Vibe coding with AI is fast, but how can we make it safer

Five new facts about the tj-actions attack

Infographic with five new facts about the tj-actions attack.

Scale Security Programs with Scorecarding

A talk expanding on the ideas first shared in ramimac.me/scorecarding

Prioritizing CVEs in the CloudSentinelOne

How to analyze and prioritize CVEs in cloud security.

How to Harden GitHub Actions: The Unofficial GuideWiz

Build resilient GitHub Actions workflows with lessons from recent attacks.

Research Briefing: MCP SecurityWiz

The present and future of security for the Model Context Protocol.

How to use CloudTrail network activity events for AWS VPCeWiz

Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

New GitHub Action supply chain attack: reviewdog/action-setupWiz

Disclosure and discussion of CVE-2025-30154 in action-setup.

🧙 Why I'm Joining Wiz

I'm joining the leading cloud security startup, hoping to "work for the Security Industry, at Wiz."

How to Say "No" Well

Security’s pivot from 'Department of No' to 'Department of Yes' misses the real lesson - how to say 'No' the right way.

State of 'State of Cloud Security' Reports: Insights or Self-Owns?

Dozens of hours reading State of Cloud Security reports that I think miss the mark.

The First Security Hire Rule of Thumb

When should you hire that first security person?

Answering "Dumb Security Questionnaires"

Doing security well? Then here are some tricks for pushing through the security questionnaire quagmire.

How to 10X Your Cloud Security (Without the Series D)

A dense, practical walkthrough of scaling cloud security programs, distilled from the best talks and posts out there

FinOps 🤝 Security

Cloud Security's overlap with FinOps benefits.

Scorecarding Security

A survey of approaches to scorecarding in security programs.

Eleventeen ways to delete an AWS resourceAWS Security Digest

Exploring the many (many) ways you can delete resources in AWS

The Security Canary Maturity ModelTracebit

A framework for understanding where your organization sits in its security canary journey

Industrial IAM Service Role Creation

A guide to tools for creating AWS IAM service roles.

An AWS IAM Security Tooling Reference

A guide to tools for auditing AWS IAM.

Canary Infrastructure vs. Real World TTPsTracebit

Breaking down three sophisticated cloud threat actors and how canary infrastructure could detect them, with diagrams

Poisoning the SSM Command Document Well

Responsibly disclosing risks in using SSM Command Docs for software distribution.

Flying Prompt Airlines

A spoiler-heavy walkthrough of Wiz's promptairlines.com

Tips for SOCLess OncallCrowdAlert

Practical tips for handling security alerts when you don't have a dedicated SOC

A hard look at GuardDuty shortcomingsTracebit

Examining why GuardDuty alone probably isn't enough for AWS threat detection

Thwacking DDOS with AWS WAF

AWS WAF is definitely not the best DDOS prevention tech on the market. But if you're ever in the seat and it's the tool you have, here's your guide.

Minor security disclosure in RDS Snapshot Public SharingTwitter

Documenting a minor AWS vulnerability where the RDS snapshot public sharing confirmation checkbox wasn't actually enforced

Publicly Exposed AWS SSM Command Documents

An analysis of the thousands of public SSM Command documents, including identification of secret leakage.

AWS OIDC Provider Enumeration

Expanding on Nick Frichette's discovery of enumerable OIDC providers in AWS using the known_aws_accounts dataset.

The Path to Zero Touch Production

A universal theory for incrementally moving a cloud-native org to Zero Touch Prod, with AWS production access primitives

Sub-Venture Scale Security Problemstl;dr sec

Why the security industry lacks small vendors fixing undifferentiated problems, plus 5 fixable gaps for security teams

Building to Prevent Subdomain Takeovers

Four controls platforms can use when building a custom-domain feature to make it resilient to subdomain takeover down the road

The Race to Make a Business of Secure Defaultstl;dr sec

Secure by Design is trending but we haven't seen a breakout startup - what makes selling secure defaults hard

What happened to RASP?

Walking through the history and challenges of the RASP market, and whether the new ADR acronym will fare any better

Don't Security Engineer Asymmetric Workloadstl;dr sec

Asymmetric workloads are a double-edged sword - security can add outsized costs on orgs just as orgs can on us

Challenges in Security Engineering ProgramsVenture in Security

Security Engineering is mainstream in certain circles - here's what we can learn from the challenges

Publicly Exposed AWS Document DB Snapshots

Deep dive into publicly exposed AWS DocumentDB snapshots, including a disclosure affecting millions of Cinemark customers

Wiring a Winning Security Organizationtl;dr sec

Summarizing Wiring the Winning Organization and applying the lessons to security programs

*AST and *SPM: Acquisition Magnets

Why there are so many *AST and *SPM startups, and why they keep getting acquired

open source - prompt-injection-defensestl;dr sec

Every practical and proposed defense against prompt injection

Semgrep for Terraform Security

How to use Semgrep for Terraform security - from evangelizing secure-by-default modules to catching subtle IaC footguns

Intentionally Leaking AWS Access Keys - GitLab

What happens when you leak AWS keys on GitLab instead of GitHub? Spoiler - nobody cared

Security is a Team Sporttl;dr sec

Cross-company collaboration in security is rarely zero sum - a practical guide and call-to-action

10 Things Your First Security Hire Shouldn’t Do

First security hire is a weird job - here's a counterfactual guide on what to avoid

open source - awesome-secure-defaultstl;dr sec

Awesome secure by default libraries to help you eliminate bug classes

Customer LoveVenture in Security

How startups can build customer love and achieve rapid growth by word of mouth

Deciding on S3 Intelligent Tiering

A playbook for evaluating S3 Intelligent Tiering with napkin math, plus tips for derisking the migration

The state of ABAC on AWS (in 2024)

Revisiting Scott Piper's 2020 analysis of AWS ABAC - things are only a little better

Did your research: Prior Art for "15 ideas for cloud security research"

A curated set of references to bootstrap your work on any of Daniel Grzelak's 15 cloud security research ideas

Steampipe + Access Advisor

Use Steampipe queries to identify and reduce over-privileged IAM permissions with Access Advisor

Quick Tip: Minimizing Terraformed SCPs

A simple Terraform trick to minify SCPs and stay under AWS character limits

A History of Human Interaction Proofs

From Turing tests to Private Access Tokens - tracing nearly 30 years of human interaction proofs

AWS SES Verification Phishing: A Fifth Way

Introducing a fifth AWS-specific phishing attack via SES email verification

Beyond the Baseline: Horizons for Cloud Security Programs

A rapid fire tour of problems you'll encounter scaling a cloud security program past Scott Piper's AWS Security Maturity Roadmap

Risk in AWS SSM Port Forwarding

A surprising SSM default that can grant shell access when you only intended port forwarding

Shipping RDS IAM Authentication (with a bastion host & SSM)

A practical walkthrough for setting up RDS IAM Authentication with a bastion host and SSM port forwarding

How to securely build product features using AI APIstl;dr sec

A deep dive guide to securely building product features on top of AI APIs

Beyond the AWS Security Maturity Roadmap

A rapid fire tour of problems you'll encounter scaling a cloud security program, with opinions on build vs buy

BSidesSF 2023 Panel (video)

Video of my BSidesSF 2023 panel appearance

Signal v. Noise in the RSA Innovation SandboxReturn on Security

Analyzing the RSA Innovation Sandbox finalists for Return on Security

A Guide to S3 Logging

Practical guidance on when to use S3 Access Logs vs CloudTrail Data Events, and how to operationalize each

Reducing Attack Surface with AWS Allowlisting

How to use Service Control Policies to allowlist AWS regions and services, dramatically reducing attack surface

Startup Security Starter Pack

Curated guides for handling security at a startup or as the first security hire

AWS Lambda Risks and Threats

A refresher on the risks and threat model of AWS Lambda

AWS Could Do More About SSO Device Auth Phishing

A look at what AWS could (and should) do to harden their SSO device code authentication flow against phishing

AWS Phishing: Four Ways

Four AWS-specific phishing vectors beyond commodity credential theft, including SSO device code and CloudFormation attacks

A retrospective on public cloud breaches of 2022, with Rami McCarthy and Houston HopkinsDatadog Security Labs

Looking back at the notable public cloud breaches of 2022 with Houston Hopkins

StaffEng Security Storiestl;dr sec

Collected stories and insights from Staff+ Security Engineers on their career paths and work

Buying Securitytl;dr sec

A practical guide to purchasing and extracting value from security services like pentests

Breach List Database

A curated meta-database of resources that compile lists of security incidents and breaches

Removing sensitive data from a Github repository

Runbooks for removing secrets and sensitive data from Git history, whether in a PR or merged to main

Buying Security: A Client's Guide

A comprehensive guide to buying and getting value from security services, from scoping to vendor selection to assessment readout

Buying Security: Bibliography

Nearly 200 references compiled for my BSidesSF talk and tldrsec guide on buying security services

AWS (Customer) Security Incidents

Walkthrough of 20+ real AWS breaches, their root causes, and lessons learned for proactive defense

Defining Cedar's Security ValuesCedar

How we defined security team values at Cedar and the process we used to get there

Cloud Security Orienteeringtl;dr sec

Written companion to my DEFCON Cloud Village talk on getting your bearings in novel cloud environments

Cloud Security Orienteering

A methodology for rapidly orienting yourself in unfamiliar cloud environments and prioritizing the risks that matter

Learning from AWS (Customer) Security Incidents

A BSidesCT talk analyzing over a dozen public AWS breaches, common root causes, and how to proactively secure your environment

AWS Security - Easy Wins and Enterprise Scale

A BSides Boston talk covering quick AWS security improvements for any organization plus big-picture considerations for enterprise environments

An AWS IAM Security Tooling Reference

A survey of open-source tools for AWS IAM security, from PMapper and Parliament for assessment to Policy Sentry and Repo Kid for maintenance

An offensive guide to the Authorization Code grantNCC Group

A compendium of OAuth 2.0 Authorization Code grant vulnerabilities that can be identified from an end-user perspective

Path to CCSK: Security Guidance v4 (Domains 1-7)

Study notes from the CSA Security Guidance covering cloud concepts, governance, legal, compliance, and infrastructure security

Path to CCSK: ENISA

Study notes from the ENISA cloud security report, covering risks, vulnerabilities, and information assurance requirements

Brandeis MS in Information Security Leadership

Why I decided to pursue a part-time online master's degree in Information Security Leadership while working full-time as a pentester

The Extended AWS Security Ramp-Up GuideNCC Group

A curated collection of the best non-Amazon resources for learning AWS security, extending the official Ramp-Up Guide

$ git blame 4: Quitten/Autorize

Adding a "Send Responses to Comparer" feature to the Autorize Burp extension for faster authorization testing triage

Building Castles in the Cloud: AWS Security and Self-Assessment

A BSidesCT talk on securing AWS environments, covering the shared responsibility model and open-source auditing tools like ScoutSuite

sadcloud: Templating cloud misconfigurations

Announcing sadcloud, a Terraform tool for spinning up intentionally insecure AWS environments for testing and training

AWS Cloud Security Fundamentals

A 4-hour workshop from BASC 2019 covering the AWS shared responsibility model, open-source auditing tools, and hands-on CloudGoat exercises

Hardening Enterprise Chromebooks Part 3: Chrome Browser ConfigurationNCC Group

Part 3 of a three-part guide focusing on hardening Chrome browser configuration for enterprise deployments

Hardening Enterprise Chromebooks Part 2: ChromeOS HardeningNCC Group

Part 2 of a three-part guide focused on hardening the ChromeOS configuration for enterprise use

Hardening Enterprise Chromebooks Part 1: Baseline Security PostureNCC Group

Part 1 of a three-part guide covering the baseline device security posture for enterprise Chromebooks

One Thousand Misspelled Security HeadersNCC Group

Using the Shodan API to find and analyze typos in HTTP security headers across the internet

Methodology: Learn Android Application Security Testing

A rundown of Android security testing tools and methods, from Manitree and MobSF to drozer and manual testing

$ git blame 3: MobSF/Mobile-Security-Framework-MobSF

Fixing a false positive in MobSF's APK certificate analysis by checking the manifest for SHA256 usage

$ git blame 1: michenriksen/bucketlist

Adding optional flags to the S3 bucket enumeration tool for filtering private bucket output and controlling wordlist permutations

$ git blame 2: michenriksen/aquatone

A small fix to aquatone's subdomain takeover detection for CloudFront, checking both HTTP and HTTPS

supply-chain

Snipping the Long Tail of Shai-Hulud 2.0Wiz

Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.

Shai-Hulud 2.0 Aftermath: Trends, Victimology and ImpactWiz

Shai-Hulud 2.0 supply chain attack - reviewing the infection spread, victimology, leaked secrets distribution, and community response so far.

Dismantling a Critical Supply Chain Risk in VSCode Extension MarketplacesWiz

Wiz Research has uncovered 550+ secrets hiding in plain sight. We worked with Microsoft to shut the door.

Shai-Hulud: Infographic

A visual analysis of the Shai-Hulud attack.

Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing MalwareWiz

Detect and mitigate a critical supply chain compromise affecting over 100+ packages, organizations should act urgently.

s1ngularity's Aftermath: AI, TTPs, and Impact in the Nx Supply Chain AttackWiz

A deeper look at the Nx supply chain attack. Analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.

s1ngularity: supply chain attack leaks secrets on GitHubWiz

Detect and mitigate a critical supply chain compromise affecting the Nx NPM Package. Organizations should act urgently.

Five new facts about the tj-actions attack

Infographic with five new facts about the tj-actions attack.

New GitHub Action supply chain attack: reviewdog/action-setupWiz

Disclosure and discussion of CVE-2025-30154 in action-setup.

syndicated

Agentic Browser Security: 2025 Year-End ReviewWiz

Are agentic browsers the new Flash? A 2025 review of new attacks, vendor security layers, and a roadmap for navigating AI browser risks.

Snipping the Long Tail of Shai-Hulud 2.0Wiz

Wiz Research reveals the data behind Shai-Hulud's 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally "snipped the tail" on a month of ongoing infections.

Shai-Hulud 2.0 Aftermath: Trends, Victimology and ImpactWiz

Shai-Hulud 2.0 supply chain attack - reviewing the infection spread, victimology, leaked secrets distribution, and community response so far.

Exposure Report: 65% of Leading AI Companies Found with Verified Secret LeaksWiz

How secure are top private AI companies? Find out from our scans and disclosures.

Dismantling a Critical Supply Chain Risk in VSCode Extension MarketplacesWiz

Wiz Research has uncovered 550+ secrets hiding in plain sight. We worked with Microsoft to shut the door.

Shai-Hulud: Infographic

A visual analysis of the Shai-Hulud attack.

Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing MalwareWiz

Detect and mitigate a critical supply chain compromise affecting over 100+ packages, organizations should act urgently.

s1ngularity's Aftermath: AI, TTPs, and Impact in the Nx Supply Chain AttackWiz

A deeper look at the Nx supply chain attack. Analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.

s1ngularity: supply chain attack leaks secrets on GitHubWiz

Detect and mitigate a critical supply chain compromise affecting the Nx NPM Package. Organizations should act urgently.

You Are Not Netflix: How to learn from conference talks

Tips and tricks for handling the fact that conference talks and engineering blogs are often quilted from small omissions and half-truths.

Leaking Secrets in the Age of AIWiz

How has AI-assisted development impacted secrets leakage?

Rules Files for Safer Vibe CodingWiz

Vibe coding with AI is fast, but how can we make it safer

Five new facts about the tj-actions attack

Infographic with five new facts about the tj-actions attack.

Scale Security Programs with Scorecarding

A talk expanding on the ideas first shared in ramimac.me/scorecarding

Prioritizing CVEs in the CloudSentinelOne

How to analyze and prioritize CVEs in cloud security.

How to Harden GitHub Actions: The Unofficial GuideWiz

Build resilient GitHub Actions workflows with lessons from recent attacks.

Research Briefing: MCP SecurityWiz

The present and future of security for the Model Context Protocol.

How to use CloudTrail network activity events for AWS VPCeWiz

Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

New GitHub Action supply chain attack: reviewdog/action-setupWiz

Disclosure and discussion of CVE-2025-30154 in action-setup.

How to 10X Your Cloud Security (Without the Series D)

A dense, practical walkthrough of scaling cloud security programs, distilled from the best talks and posts out there

Eleventeen ways to delete an AWS resourceAWS Security Digest

Exploring the many (many) ways you can delete resources in AWS

The Security Canary Maturity ModelTracebit

A framework for understanding where your organization sits in its security canary journey

Canary Infrastructure vs. Real World TTPsTracebit

Breaking down three sophisticated cloud threat actors and how canary infrastructure could detect them, with diagrams

Tips for SOCLess OncallCrowdAlert

Practical tips for handling security alerts when you don't have a dedicated SOC

A hard look at GuardDuty shortcomingsTracebit

Examining why GuardDuty alone probably isn't enough for AWS threat detection

Minor security disclosure in RDS Snapshot Public SharingTwitter

Documenting a minor AWS vulnerability where the RDS snapshot public sharing confirmation checkbox wasn't actually enforced

The Path to Zero Touch Production

A universal theory for incrementally moving a cloud-native org to Zero Touch Prod, with AWS production access primitives

Sub-Venture Scale Security Problemstl;dr sec

Why the security industry lacks small vendors fixing undifferentiated problems, plus 5 fixable gaps for security teams

The Race to Make a Business of Secure Defaultstl;dr sec

Secure by Design is trending but we haven't seen a breakout startup - what makes selling secure defaults hard

Don't Security Engineer Asymmetric Workloadstl;dr sec

Asymmetric workloads are a double-edged sword - security can add outsized costs on orgs just as orgs can on us

Challenges in Security Engineering ProgramsVenture in Security

Security Engineering is mainstream in certain circles - here's what we can learn from the challenges

Wiring a Winning Security Organizationtl;dr sec

Summarizing Wiring the Winning Organization and applying the lessons to security programs

open source - prompt-injection-defensestl;dr sec

Every practical and proposed defense against prompt injection

Security is a Team Sporttl;dr sec

Cross-company collaboration in security is rarely zero sum - a practical guide and call-to-action

open source - awesome-secure-defaultstl;dr sec

Awesome secure by default libraries to help you eliminate bug classes

Customer LoveVenture in Security

How startups can build customer love and achieve rapid growth by word of mouth

How to securely build product features using AI APIstl;dr sec

A deep dive guide to securely building product features on top of AI APIs

Beyond the AWS Security Maturity Roadmap

A rapid fire tour of problems you'll encounter scaling a cloud security program, with opinions on build vs buy

Startup Security Starter Pack

Curated guides for handling security at a startup or as the first security hire

AWS Lambda Risks and Threats

A refresher on the risks and threat model of AWS Lambda

A retrospective on public cloud breaches of 2022, with Rami McCarthy and Houston HopkinsDatadog Security Labs

Looking back at the notable public cloud breaches of 2022 with Houston Hopkins

StaffEng Security Storiestl;dr sec

Collected stories and insights from Staff+ Security Engineers on their career paths and work

Buying Securitytl;dr sec

A practical guide to purchasing and extracting value from security services like pentests

AWS (Customer) Security Incidents

Walkthrough of 20+ real AWS breaches, their root causes, and lessons learned for proactive defense

Defining Cedar's Security ValuesCedar

How we defined security team values at Cedar and the process we used to get there

Cloud Security Orienteeringtl;dr sec

Written companion to my DEFCON Cloud Village talk on getting your bearings in novel cloud environments

An offensive guide to the Authorization Code grantNCC Group

A compendium of OAuth 2.0 Authorization Code grant vulnerabilities that can be identified from an end-user perspective

The Extended AWS Security Ramp-Up GuideNCC Group

A curated collection of the best non-Amazon resources for learning AWS security, extending the official Ramp-Up Guide

sadcloud: Templating cloud misconfigurations

Announcing sadcloud, a Terraform tool for spinning up intentionally insecure AWS environments for testing and training

Hardening Enterprise Chromebooks Part 3: Chrome Browser ConfigurationNCC Group

Part 3 of a three-part guide focusing on hardening Chrome browser configuration for enterprise deployments

Hardening Enterprise Chromebooks Part 2: ChromeOS HardeningNCC Group

Part 2 of a three-part guide focused on hardening the ChromeOS configuration for enterprise use

Hardening Enterprise Chromebooks Part 1: Baseline Security PostureNCC Group

Part 1 of a three-part guide covering the baseline device security posture for enterprise Chromebooks

One Thousand Misspelled Security HeadersNCC Group

Using the Shodan API to find and analyze typos in HTTP security headers across the internet