π₯ A New Dawn: Attack-as-Code | Attack Scheduler π€Ί
These new features would change your cloud security game FOREVER.
These features streamline the adoption of Continuous Threat Exposure Management, mature Detection Engineering functions & supercharge SOC teams. Details π mitigant.io/en/blog/feat...
31.01.2025 17:47
π 0
π 0
π¬ 0
π 0
Demystifying Amazon Bedrock LLMJacking Attacks | Mitigant
LLMJacking attacks are increasingly targeting GenAI workloads on Amazon Bedrock. Cybercriminals illegally gain access to Large Language Models during LLMJacking attacks and resell this access via chat...
These logs are essential for understanding attacks that target models, such as LLMJacking. This level of understanding is imperative for preventing, detecting, and responding to such attacks and other forms of abuse.
See some details about LLMJacking here -> mitigant.io/de/blog/demy...
25.01.2025 13:44
π 0
π 0
π¬ 0
π 0
These include model input/output data with important details like event timestamps, request IDs, model IDs, token usage, and all the cool stuff that often determine whether an attacker gets in successfully or is frustrated away! β οΈ
25.01.2025 13:42
π 0
π 0
π¬ 1
π 0
β‘ Bedrock Security: Model Invocation Logs + CloudWatch π₯
Several Bedrock events are available in Cloudtrail, but model-level events aren't.
Leverage model invocation logs to breach this visibility gap. These logs contain critical information for security auditing, abuse detection, etc
25.01.2025 13:41
π 0
π 0
π¬ 1
π 0
π WTF is Detection Engineering Maturity π
Do you want to build a DE fxn from the ground up, or mature the fxn, or know what's up with this DE thing? π€
π Check out the Detection Engineering Maturity Matrix-> detectionengineering.io
#detectionengineering #securityoperations #cloudsecurity
16.01.2025 10:49
π 0
π 0
π¬ 0
π 0
β‘Making Security Agile: Attack-as-Codeβ‘
Security validation should be easy, repeatable, consistent & versioned. Enter Attack-as-Code!
π Detection engineering use cases -> mitigant.io/en/blog/clou...
#RedTeam #PurpleTeam #securityoperations #awssecurity #threathunting #blueteam #threatdetection
09.01.2025 13:29
π 0
π 0
π¬ 0
π 0
π€Ί Beyond SSRF: When SSM Agents Go Rogue π
π₯ Okay, we love SSM Agents! They are great tools for managing EC2 Instances at scale. However, if attackers abuse them, they could become pain points.
π€ So what can go wrong?
Check it out -> mitigant.io/en/blog/leve...
06.01.2025 12:27
π 0
π 0
π¬ 0
π 0