Cyber Defense Advisors

News

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

US to Launch Third Iteration of ‘Hack the Pentagon’ Bug Bounty Program

Cybersecurity researchers will try and find vulnerabilities in the government’s FRCS network

Cyber News, Cyber Threat Trends

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The Coming AI Hackers” and will be held Friday, February 3 at 1:00 PM. The list is maintained on this page.

Cyber News, Cyber Threat Trends
  • by
  • January 16, 2023

Privilege Escalation Via a Cloud Compute Resource

ACM.133 Limiting Pass Role permissions using AWS IAM policies This is a continuation of my series on Automating Cybersecurity Metrics. In the last post I wrote about AWS IAM Permission Boundaries. AWS IAM Permission Boundaries In this post we’ll consider permission boundaries with the IAM Pass Role permission. The IAM Pass Role permission How does a […]

Cyber News, Cyber Threat Trends
  • by
  • January 16, 2023

What is Cloud?

Defining a nebulous term This is a bonus topic as I’m working through this series on Automating Cybersecurity Metrics and reading other cybersecurity material simultaneously. I have run across a number of interesting definitions of cloud over the years and just recently read one again which prompted me to write this post. It’s just a random […]

Cyber News, Cyber Threat Trends