24:03Cloud Abuse at Scale How Cybercriminals Exploit Free Tiers for Profitfwd:cloudsec306 views·7 months ago
23:51The File That Contained the Keys Has Been Removed An Analysis of Secret Leaks in Cloud Buckets and…fwd:cloudsec139 views·7 months ago
25:31Source IP Spoofing in Cloud Logs A Hands-On Look Across AWS, Azure, and GCPfwd:cloudsec238 views·7 months ago
23:56Permission Impossible Hidden Dangers of Azure RBAC and API Vulnerabilitiesfwd:cloudsec336 views·7 months ago
24:48Dealing with Storage Data Logs in the Cloud A Hidden Challengefwd:cloudsec166 views·7 months ago
16:22Opening Remarks for fwdCloudSec Europe 2025 - Karim El-Melhaouifwd:cloudsec160 views·7 months ago
26:51Continuous Integration Continuous Deception Trying my luck as a malicious maintainerfwd:cloudsec125 views·7 months ago
24:41Connecting the Cloud-Dots Constructing a Knowledge Layer from Autonomous Attack Simulationfwd:cloudsec163 views·7 months ago
25:50And I Would've Gotten Away With It, Too, If It Wasn't For You Meddling Researchersfwd:cloudsec103 views·7 months ago
27:12From One to Hundreds Reflections on a Decade of Building the Trenchesfwd:cloudsec118 views·7 months ago
23:07Sweet Deception Mastering AWS Honey Tokens to Detect and Outsmart Attackersfwd:cloudsec377 views·7 months ago
15:54Mistrusted Advisor When AWS Tooling Leaves Public S3 Buckets Undetectedfwd:cloudsec135 views·7 months ago
19:18Lurking in the (documentation) shadows Why We Built the AWS Security Changes Projectfwd:cloudsec167 views·7 months ago
23:16Pods Without Borders Lateral Movement in Azure Kubernetes Servicefwd:cloudsec83 views·7 months ago
43:12Confidence Predicts Accuracy and Other Lies About Cloud Securityfwd:cloudsec104 views·7 months ago
19:34SyncJacked - Hijacking Identities Through Entra Connect Synchronizationfwd:cloudsec267 views·7 months ago
45:54Console Hero to IAM Zero Learn from Temporal's Just-In-Time Journeyfwd:cloudsec88 views·7 months ago
25:48Ransomware protection with immutable AWS Backup - it's complicatedfwd:cloudsec330 views·7 months ago
27:11A Candid Perspective on the Cloud Threat Landscape What’s Real, What’s Not, and What Should Changefwd:cloudsec138 views·7 months ago
19:07Read Between The Logs A New Vulnerability in Gemini Cloud Assist Proves the Threat is Realfwd:cloudsec559 views·10 months ago
36:22Securing organizations ML & LLMops deployments A platform architects journey onboarding LLM &...fwd:cloudsec872 views·10 months ago
21:51Breaking AI Agents Exploiting Managed Prompt Templates to Take Over Amazon Bedrock Agentsfwd:cloudsec862 views·10 months ago