
Permiso Security
@permisosecurity
Detection for all of your clouds - identity providers, Iaas, Saas, Paas and more.
ID: 1462864917300609028
https://www.permiso.io 22-11-2021 19:25:56
292 Tweet
902 Followers
372 Following


If you're heading to SecureWorld in Chicago next week, be sure to check out Andrew Kraut's session, "The Evolving Cyber Threat Landscape: Tales of Villains, Heroes and Resilience." Be sure to swing by booth 350 and say hi to Milan Gavran and Permiso Security Randall!


We are back on the road for some upcoming shows and conferences! 5/21 - SecureWorld in Chicago 6/09 - Gartner Security & Risk Management Summit in DC 6/29 - fwd:cloudsec in Denver


During recent threat hunting activities, Daniel Bohannon and Abian Morina discovered a subtle, but significant flaw in AWS. After drilling into IAM policies, they discovered that #CloudTrail fails to log oversized policies due to undocumented size thresholds - a blind spot


Big thanks to AWS Security Digest for covering Abian Morina and Daniel Bohannon's recent #CloudTrail logging evasion vulnerability. "Simple hacking is the best hacking. What happens if you stick a lot of whitespace in a request to the AWS API? Sometimes maybe good things, sometimes

Leo Tsaousis Permiso Security saw some threat actors using console-only APIs. permiso.io/blog/exploitin… That’s the first one that comes to mind.

Thanks to Phill Moore for including Abian Morina and Daniel Bohannon's recent threat research on #CloudTrail logging evasion in his recent issue of This Week in 4n6! thisweekin4n6.com/2025/06/01/wee…

Huge thanks to Zack Allen and Detection Engineering Weekly for including Abian Morina and Daniel Bohannon's recent blog article on #CloudTrail logging evasion by leveraging whitespace in IAM policy size limits. "Ok this is a hilarious vulnerability, and it’s relevant for




AWS CloudTrail logging is not as bulletproof as many teams assume. Recent research by Permiso Security has exposed a class of evasion techniques that exploit policy size limits and how whitespace is handled in IAM policies. Although AWS states that whitespace does not count

After yesterdays test on the Permiso Security MCP, I tried a bunch more basic prompt injection techniques by embedding names and tags in AWS resources with instructions. All available models in Cursor handled this super well. Though I have a bunch more ideas to try!



We're less than two weeks away from fwd:cloudsec ! -Nathan Eades will be speaking on 'The False Sense of Security: Defense Becoming A Vulnerability' pretalx.com/fwd-cloudsec-2… -We're teaming up with our friends at Tamnoon to host Arcade & Apps at #LuckyStrike Denver -Permiso




Permiso's Director of Adversary Detection, Nathan Eades is taking the stage at fwd:cloudsec in less than an hour! If you're not at the conference, you can watch live! youtube.com/watch?v=si9qVV…

Big thanks to everyone that came out to our event at fwd:cloudsec. Great catching up with old friends and meeting new people!
