Hacking the Cloud

114 posts

Hacking the Cloud banner
Hacking the Cloud

Hacking the Cloud

@HackingthCloud

The official Twitter account for Hacking the Cloud, the open-source encyclopedia of offensive security techniques in the cloud. Created by @frichette_n

Your Cloud Katılım Şubat 2024
1 Takip Edilen242 Takipçiler
Hacking the Cloud retweetledi
Scott Piper
Scott Piper@0xdabbad00·
The location for AWS’s in-development European Sovereign Cloud (Berlin) is also a hotbed for Luddite action. Fault tolerance there will be extra spicy, especially for a single region partition. theguardian.com/world/2026/jan…
English
1
2
5
1.7K
Hacking the Cloud retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
The 2025 Hacking the Cloud: Year in Review is out! We take a look at the growing tide of software supply chain attacks, discuss the most critical cloud vuln discovered to date, and share some stats for the site! hackingthe.cloud/blog/2025_wrap…
English
0
3
6
298
Hacking the Cloud retweetledi
Kostas
Kostas@Kostastsale·
We’re off to a great start with macOS telemetry. Big thanks to @OliviaGalluccii for kicking things off and leading the initial work to bring macOS into the EDR Telemetry Project next year. She opened the first PR defining macOS telemetry categories and rationale. Now is the time to share your thoughts, as we’re actively deciding which events and telemetry make it into this first and most important iteration of macOS support! github.com/tsale/EDR-Tele…
English
4
9
68
4.9K
Hacking the Cloud retweetledi
Scott Piper
Scott Piper@0xdabbad00·
I think isof used a location designator other than an airport? 🤔 ALE airport is in Alpine, TX. That's a remote place to put an AWS partition. There's no military base and barely any population. The domain for the endpoints is us-isof-south-1.csp.hci.ic.gov
Scott Piper tweet mediaScott Piper tweet media
English
1
2
4
1.4K
Hacking the Cloud retweetledi
Katie Knowles
Katie Knowles@_sigil·
😈 Copilot Studio agents are great for users... and attackers! Check out our deep-dive on why you should be careful to trust unknown agents, plus background on upcoming app consent changes that will help prevent our demo scenario. securitylabs.datadoghq.com/articles/cophi…
English
0
5
15
2.1K
Hacking the Cloud retweetledi
Yuval Avrahami
Yuval Avrahami@yuvalavra·
After years of hacking on Azure it feels great to finally get 1st 🥇 Thanks @msftsecresponse ❤️
Microsoft Security Response Center@msftsecresponse

Congratulations to all the researchers recognized in this quarter’s MSRC 2025 Q3 Security Researcher Leaderboard! Thanks to all the researchers who partnered with us for your hard work and continued dedication to securing our customers. Learn more in our blog post: msft.it/6016sfncp We also want to recognize the top 10 researchers in the leaderboard: 🥇Brad Schlintz (@nmdhkr) 🥈 Yuval Avrahami 🥉 b2ahex 4. Jianyang song 5. Felix B. 6. Haifei Li @HaifeiLi 6. tuandv of Viettel Cyber Security 8. P1hcn 9. 0x140ce @0x140ce 10. Matthew Jensen

English
1
4
29
8.1K
Hacking the Cloud retweetledi
Permiso Security
Permiso Security@permisosecurity·
Great write up from the @The_Cyber_News on our latest open-source tool, #Inboxfuscation, in their newsletter today. "A new open-source tool named Inboxfuscation can create malicious inbox rules in Microsoft Exchange that are difficult for security tools to detect. Developed by security firm Permiso, the tool uses Unicode-based obfuscation to hide keywords in rules, allowing attackers to maintain persistence and exfiltrate data from compromised mailboxes. This technique can substitute standard characters with visually identical Unicode variants, making the rules appear harmless while functionally matching sensitive terms. While these specific obfuscation methods have not yet been observed in active attacks, their development exposes a critical blind spot in email security postures." #google_vignette" target="_blank" rel="nofollow noopener">cybersecuritynews.com/cybersecurity-…
English
0
3
4
313
Hacking the Cloud retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
It’s a month and a half away but I’m already super excited for @fwdcloudsec EU! If you’ll be there in Berlin, come find me for limited edition, holographic, @HackingthCloud stickers!
Nick Frichette tweet media
English
0
2
10
1K
Hacking the Cloud
Hacking the Cloud@HackingthCloud·
Safe travels to everyone coming to @fwdcloudsec! It’s the densest concentration of cloud security nerds in the world!
English
0
1
1
124
Hacking the Cloud retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
There is a lot wrong with what happened here, but I’ll complain about the parts in my wheel house. Exposing access keys via an API?! Having logs go to a bucket that could be claimed by anyone?! AHHHH We still have so far to go with cloud security. specterops.io/blog/2025/06/1…
English
3
3
17
1.1K
Hacking the Cloud retweetledi
Permiso Security
Permiso Security@permisosecurity·
If you're heading to fwd:cloudsec in a few weeks, we are teaming up with our friends at @tamnoon_io to host Arcade & Apps. What's better than pizza and arcade games after a long day of conferencing? Space is limited, so reserve your spot by signing up! tamnoon.io/fwd-cloudsec-n…
Permiso Security tweet media
English
0
2
4
252
Hacking the Cloud retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
If you're looking for a sts:GetCallerIdentity replacement that doesn't log to CloudTrail, I've added a few more APIs that don't log and don't have support for additional logging with Data events. Perfect for a quiet `whoami` in the AWS control plane. hackingthe.cloud/aws/enumeratio…
English
1
20
74
2.9K
Hacking the Cloud retweetledi
Aidan W Steele
Aidan W Steele@__steele·
Why does AWS Amplify not use CodeConnections? The latter is a nice way to set up integration with GitHub once and share it across a whole org - except for Amplify 🫠 Is it due to Amplify having extra functionality, maybe?
English
4
1
8
1.6K
Hacking the Cloud retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
A little over a year ago I published research on how you could leverage non-production AWS API endpoints to enumerate permissions without logging to CloudTrail. A year later...I'm still finding them. Red Teamers, these can be super useful and really up your game!
Nick Frichette tweet media
English
2
21
121
7.7K