Advertisement · 728 × 90

Posts by Rami

Preview
TeamPCP Supply Chain Campaign | Attack Timeline & IOCs Timeline and IOCs for TeamPCP's March 2026 supply chain campaign. Trivy, KICS, LiteLLM, and 45+ npm packages compromised through chained credential theft.

There is currently a wave of supply chain attacks clustered around TeamPCP, a financially motivated threat actor.

Today, the latest news was telnyx's python package had malicious versions pushed. This follows trivy, checkmarx (kics), and litellm incidents.

Get the details: ramimac.me/teampcp

1 week ago 2 1 0 0
Preview
Supply Chain Risk in VSCode Extension Marketplaces | Wiz Blog Wiz Research uncovered 500+ leaked secrets in VSCode and Open VSX extensions, exposing 150K installs to risk. Learn what happened and how it was fixed.

🚨 Wiz Research uncovered 100+ leaked VSCode publisher tokens that could let attackers push malicious updates to 185K+ installs. We partnered with Microsoft to secure tokens and protect the ecosystem.

5 months ago 2 2 0 0
Post image

🚨 We scanned GitHub and found *hundreds* of valid secrets, 4 of the top 5 were AI-related:
HuggingFace, Azure OpenAI, Weights & Biases, and Groq.

Read more:
www.wiz.io/blog/leaking...

9 months ago 3 1 0 0
Preview
Securing open-source credentials at scale | Google Cloud Blog We’ve developed a powerful tool to scan open-source package and image files by default for leaked Google Cloud credentials. Here’s how to use it.

> We've set up a web endpoint so vetted ... security researchers can submit suspected exposed credentials for review
> To report exposed Google Cloud credentials, please contact gcp-credentials-reports@google.com

cloud.google.com/blog/product... really buried the lede!

9 months ago 2 1 0 0
Preview
Hardening GitHub Actions: Lessons from Recent Attacks | Wiz Blog Build resilient GitHub Actions workflows with insights from real attacks, missteps to avoid, and security tips GitHub’s docs don’t fully cover.

In light of recent GitHub Actions incidents (Ultralytics, tj-actions...), I wrote up a practical guide to hardening for @wizsecurity.bsky.social

Covers permissions, secrets, 3rd-party Actions, ++

Use it to avoid learning these lessons the hard way:
www.wiz.io/blog/github-...

11 months ago 7 4 0 0
Preview
MCP and LLM Security Research Briefing | Wiz Blog Explore the evolving Model Context Protocol (MCP), its security risks, and how to prepare for safe adoption as LLMs connect to external systems.

Synthesized 20+ sources and internal @wizsecurity.bsky.social expertise to come out with a comprehensive guide to MCP security

Today's options, and tomorrow's possibilities

www.wiz.io/blog/mcp-sec...

11 months ago 5 1 0 0
Preview
Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound Podcast Episode · Crying Out Cloud · 04/09/2025 · 29m

🎙️ New episode!
Our own @ramimac.me helps dive into GitHub supply chain attacks, IngressNightmare, and Oracle breach rumors.

Tune in for the latest cloud security insights!
🎧 podcasts.apple.com/us/podcast/q...

1 year ago 2 1 0 0
Advertisement
Preview
CloudTrail Network Activity Events for AWS VPC Endpoints | Wiz Blog How AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

It's been awesome getting to team up with @ramimac.me to dig into a new AWS feature! Read our thoughts on AWS's new CloudTrail network activity events (aka VPC endpoint logs): www.wiz.io/blog/aws-vpc...

1 year ago 9 2 0 0
Preview
GitHub Action supply chain attack: reviewdog/action-setup | Wiz Blog A supply chain attack on tj-actions/changed-files leaked secrets. Wiz Research found another attack on reviewdog/actions-setup, possibly causing the compromise.

Turns out when you investigate a compromised Github Actions you ... find another compromised Github Action:

www.wiz.io/blog/new-git...

1 year ago 15 9 1 0

Very fun to help put final polish on this report in week 3 at Wiz - anecdata is fun, data is funner :)

1 year ago 5 1 0 0
Preview
🧙 Why I’m Joining Wiz I’m joining the leading cloud security startup, hoping to “work for the Security Industry, at Wiz.”

New year, new job!

I've joined the amazing @wiz_io research team

My goal is the "work for the security industry, at Wiz"

I wrote a blog post explaining why, and what that means:
ramimac.me/joining-wiz

1 year ago 33 4 3 0
Preview
How to Say “No” Well Security’s pivot from ‘Department of No’ to ‘Department of Yes’ misses the real lesson - how to say ‘No’ the right way.

Lately, every BSides seems to have a talk on reframing security teams as a “Department of Yes”

We don’t hear nearly as much about the value of a well-considered, strategically deployed “No”

I've pulled together guidance on giving a better, more constructive No:
ramimac.me/saying-no

1 year ago 21 10 0 0
Post image

Keep an eye out for notices - AWS RDS Protection for Guardduty seems to have had some issues collecting logs.

Unclear how pervasive this was!

1 year ago 7 4 1 0
Preview
Poisoning the SSM Command Document Well Responsibly disclosing risks in using SSM Command Docs for software distribution.

reminds me of ramimac.me/poisoning-ss... 😉

1 year ago 2 0 0 0
Advertisement
Preview
State of ‘State of Cloud Security’ Reports: Insights or Self-Owns? Dozens of hours reading State of Cloud Security reports that I think miss the mark.

One recent report highlighted that roughly a third of their customers have “at least one cloud workload that is publicly exposed, critically vulnerable and highly privileged.”

If you’re this vendor, should I really buy your product?

ramimac.me/state-of-clo...

1 year ago 1 0 0 0
Post image

I've spent dozens of hours reading State of Cloud Security reports

You know, the ones that use data from their CSPM product

And I've realized the findings substantially reflect how well that tool helps customers secure their clouds

I wrote up some examples, both good and bad (🔗 in 🧵)

1 year ago 8 4 1 0
Preview
“Founder Mode” and the Art of Mythmaking I’ve never been good at “hot takes”. Anyone who knows anything about marketing can tell you that the best time to share your opinion about something is when everyone is all worked up about it. Hot …

I (finally) wrote up my thoughts on "Founder Mode" and the Brian Chesky morality tale about how he turned around Airbnb company culture.

This has made it into the Silicon Valley water table; it must be dealt with. There are some good nuggets within; let's dig them out.

charity.wtf/2024/12/17/f...

1 year ago 295 94 26 37

www.cybok.org/media/downlo...

1 year ago 3 0 1 0
Post image

New Threat Vector Unlocked

1. Find the Crunchbase page of a cybersecurity company that just raised VC funding
2. Change the page details (which anyone with a Crunchbase account can do) to a personal CashApp page
3. ????
4. Profit! (?)

1 year ago 5 2 1 0
A decade of defense: securing the largest US crypto exchange | Philip Martin |  MSSN CTRL 2024
A decade of defense: securing the largest US crypto exchange | Philip Martin | MSSN CTRL 2024 YouTube video by LimaCharlie

Somehow <50 people have caught this talk from Coinbase's CSO??

His core advice:
1. Make lives easier - e.g roll out yubikeys
2. Define Security Invariants
3. Plan & Practice IR
4. Balance Risks & Threats
5. Security is a People Problem - use focus groups for new controls!

youtu.be/BPh4Hc3TH74

1 year ago 12 1 0 0

Just keep dm'ing them to me so I can bully you into publishing 😈

1 year ago 2 0 0 0
Advertisement

Interesting research out of AWS!

> IAM-PolicyRefiner, a tool that automatically synthesizes refined AWS IAM access control policies from access logs

> fast (<5s per policy), effective and does not overfit

Not open source, but maybe a sign of things to come?

assets.amazon.science/cf/bc/58e56f...

1 year ago 7 1 0 0

IIRC, re:Inforce was a bust for security announcements.

I wish some of these announcements got time center stage there, versus being pre:Invent announcements now.

Hopefully re:Invent makes space alongside the GenAI noise!

1 year ago 2 0 0 0
Post image

I've been chatting a lot re:when to make the first security hire" recently

I've come up with a Rule of Thumb:
Hire your first security person when security is an unavoidable distraction from scaling your business

ramimac.me/start-security

h/t @grims.bsky.social & @mag00.bsky.social

1 year ago 10 1 0 0

This webinar will be more relay-race than sparring match when it's with folks like @nanook.bsky.social and @jamesberthoty.bsky.social!

1 year ago 3 0 0 0
Preview
Don’t click: towards an effective anti-phishing training. A comparative literature review - Human-centric Computing and Information Sciences Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many ...

I think it's pretty easy to dig up research that ties phishing simulations to a decrease in metrics like Click Through Rate or improvement in "awareness" - but I'd argue those aren't the metrics that matter!
Ex. hcis-journal.springeropen.com/articles/10....

1 year ago 1 0 0 0
CSDL | IEEE Computer Society

I love when new research comes out to back up my "phishing training is bad practice" priors:

www.computer.org/csdl/proceed...

I track the latest evidence against phishing simulations: rami.wiki/phishing-sim...

1 year ago 6 2 2 0
Preview
Platform Engineering Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of a...

Wondering “What Does Success Look Like?”

Check out the book!

There is incredible depth, detail, and color provided that I can only hint at in this format: www.oreilly.com/library/view...

Thank you to Camille and Ian for sharing their expertise

1 year ago 7 2 0 0

“Saying “No” Without Ruining the Relationship”

- “Not yet, priority call” → give options and how they can help
- “Not yet, technical call” → take time to explain the details
- “No, product strategy call” → accept shadow IT or alternative platforms
- “No, technical call” → beware magical thinking

1 year ago 1 0 1 0
high power + low interest = keep satisfied
low power + low interest = monitor with minimum effort
high power + high interest = manage closely
low power + high interest  = keep informed

high power + low interest = keep satisfied low power + low interest = monitor with minimum effort high power + high interest = manage closely low power + high interest = keep informed

Use the handy-dandy power-interest grid to prioritize stakeholder management!

1 year ago 1 0 1 0