The GCP Service Account That Could Read Everything
A short story about Artifact Registry reader access, container images, and why build history quietly leaks secrets.
Learn more →Explore our latest articles on platform security, cloud vulnerabilities, and industry best practices. Our team shares research findings, technical tutorials, and security insights to help you stay informed.
A short story about Artifact Registry reader access, container images, and why build history quietly leaks secrets.
Learn more →How a tiny ptrace bird turned into a credential avalanche. The story of building Hawk, a lightweight Golang tool that silently intercepts SSH and sudo credentials in real time, and why it dominates in competitive red team exercises.
Learn more →When an incident strikes, organizations turn to those who know best, those that do it best. This article provides a singular example of how despite any sort of bad press, Tech Giants stay Tech Giants for a reason.
Learn more →A research-driven look into how attackers construct phishing landing pages that mimic Microsoft federated login portals, and what defenders can do about it.
Learn more →A case study on the ToolShell SharePoint exploit chain, exploring how persistent zero-days, patch delays, and organizational gaps turn platform security into an endless pursuit between attacker and defender.
Learn more →Redshift authentication sounds simple until you try to make it secure and usable at scale. This post dives into the broken state of IAM, in-database users, and the messy tradeoffs data and platform teams face daily.
Learn more →An analysis of how misinformation spreads in the digital age, examining the recent 16 billion password dataset discovery and how media outlets distorted the facts for sensationalism and clicks.
Learn more →715k requests in a week on a $4 VPS. Here's how we pulled it off with Cloudflare, Kubernetes, and a little obsession with optimization.
Learn more →A step-by-step walkthrough of how I leveraged AI to analyze, understand, and exploit the Erlang SSH pre-authentication vulnerability (CVE-2025-32433) without any existing public proof of concept. Learn how AI is transforming vulnerability research and exploit development.
Learn more →CVE-2025-1974 allows unauthenticated remote code execution in Kubernetes Ingress-NGINX by abusing unsanitized annotations. Dive deep into the vulnerability mechanics, proof-of-concept, real-world applicability, and mitigations.
Learn more →A case study on how a kernel vulnerability shattered assumptions about container security, exposing the need for deeper isolation and architectural redesign.
Learn more →A deep dive into how adversarial attacks manipulate machine learning models, the types of evasion attacks, and real-world implications.
Learn more →Discover how abusing AWS CloudFormation can lead to a total takeover of an AWS environment through privilege escalation, highlighting the importance of securing credentials and implementing robust security measures.
Learn more →Welcome to our new blog dedicated to Platform Security!
Learn more →