Back to Blog
Resources from
Bleon Proko
Security Researcher
at
Exaforce
Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud
The log rings don’t lie: historical enumeration in plain sight
Do you feel in control? Analysis of AWS CloudControl API as an attack tool
There’s a snake in my package! How attackers are going from code to coin
Ghost in the Script: Impersonating Google App Script projects for stealthy persistence