top of page
Research


What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places
<p>TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly […]</p>
idan ba
Aug 8, 202412 min read


Google TAG's Analysis on the Israel-Iran-Hamas Cyber Warfare Before and After Oct 7th
Google's Threat Analysis Group (TAG) just released a very interesting analysis of the offensive cyber activities between Israel, Iran and Hamas-Linked groups. The research covers offensive activities both leading to Oct 7th and after Oct 7th. In a recent in-depth analysis by Google’s Threat Analysis Group (TAG), the intricate web of cyber operations involving Israel, […]
idan ba
Feb 15, 20244 min read
bottom of page