Hacker Newsnew | past | comments | ask | show | jobs | submit | tracebit's submissionslogin
1.Code Execution Through Deception: Gemini AI CLI Hijack (tracebit.com)
2 points by tracebit 4 months ago | past
2.Surprising inconsistencies in Azure audit logging (tracebit.com)
7 points by tracebit 12 months ago | past
3.Breaching the AWS Data Perimeter: Data Exfiltration via AWS CloudTrail (tracebit.com)
5 points by tracebit on Oct 17, 2024 | past
4.Breaching the Data Perimeter: CloudTrail as a Mechanism for Data Exfiltration (tracebit.com)
6 points by tracebit on Oct 15, 2024 | past | 1 comment
5.The Security Canary Maturity Model (tracebit.com)
5 points by tracebit on Sept 13, 2024 | past
6.Real World Cloud TTPs vs. Canary Infrastructure (tracebit.com)
6 points by tracebit on Aug 14, 2024 | past
7.NO_WILDCARD: How I Discovered the Organization ID of Any AWS Account (tracebit.com)
5 points by tracebit on July 22, 2024 | past
8.A hard look at AWS GuardDuty shortcomings (tracebit.com)
69 points by tracebit on July 16, 2024 | past | 16 comments
9.Canary AWS credentials: Beyond a token effort (tracebit.com)
1 point by tracebit on May 5, 2024 | past
10.Honeypots vs. Canary Infra (tracebit.com)
1 point by tracebit on March 14, 2024 | past
11.How to find the AWS account ID of any S3 bucket (tracebit.com)
583 points by tracebit on Feb 26, 2024 | past | 215 comments
12.How fast is AWS CloudTrail? Investigating CloudTrail delays using Athena (tracebit.com)
7 points by tracebit on Nov 28, 2023 | past
13.Honeypots for Intrusion Detection (tracebit.com)
3 points by tracebit on Nov 23, 2023 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: