Harsha Koushik (@0xlcheetah) 's Twitter Profile
Harsha Koushik

@0xlcheetah

Security Researcher @PaloAltoNtwks | Ex SecurityEngg @DisneyPlusHS

ID: 2365463095

linkhttp://medium.com/@hkoushik calendar_today28-02-2014 11:17:26

42 Tweet

52 Followers

139 Following

Steampipe (@steampipeio) 's Twitter Profile Photo

Thanks, Harsha Koushik, for writing about steampipe.io. "One of the best tools when it comes to querying data from various systems for analysis is Steampipe." ✅ Powerful data operations ✅ Live/on-demand queries medium.com/kernel-space/w…

Harsha Koushik (@0xlcheetah) 's Twitter Profile Photo

Why you should keep monitoring your AWS Managed Policies - medium.com/p/75c1cd95e2b3 You can make use of this tool if you do not want to build one - github.com/z0ph/MAMIP , this is by Scott Piper (Summit Route ) #aws #IAM

GitHub Security (@githubsecurity) 's Twitter Profile Photo

Incredibly excited to see Entitlements open sourced for identity and access management on GitHub! Bravo Shawna Butterworth Social Media Vacation and @notmailman! 👏🎉👏🎉 github.blog/2022-06-09-int…

Gaurav Kamboj (@oyehooye) 's Twitter Profile Photo

How do you search if an IP address or IAM access key belongs to one of the 50+ AWS accounts that you manage? Check out how our team leveraged #ChatOps for building "Cloud Resource Explorer" blog.hotstar.com/chatops-cloud-… via Harsha Koushik (AWS Community Builder) Jeff Barr ☁️ Not coming back here, join Threads | Jason Dunn

How do you search if an IP address or IAM access key belongs to one of the 50+ AWS accounts that you manage? 

Check out how our team leveraged #ChatOps for building "Cloud Resource Explorer" blog.hotstar.com/chatops-cloud-… via 
<a href="/0xlcheetah/">Harsha Koushik</a> (AWS Community Builder)

<a href="/jeffbarr/">Jeff Barr ☁️</a> <a href="/jasondunn/">Not coming back here, join Threads | Jason Dunn</a>
Harsha Koushik (@0xlcheetah) 's Twitter Profile Photo

Believing that a company is truly secure based solely on its compliance certifications is like assuming someone is an engineer simply because they hold an engineering degree. #compliance #security

Shivasai_challa (@mr_cyborgboy) 's Twitter Profile Photo

🔐 Join us this weekend on Twitter Space! with Harsha Koushik & sammy to discuss about security trends and CNAPPs transformation. 📷 Let's discuss challenges, brainstorm. #SecurityEnthusiasts #Cybersecurity #TwitterSpace Don't miss out - Stay Tuned linkedin.com/posts/hkoushik…

Shivasai_challa (@mr_cyborgboy) 's Twitter Profile Photo

Hey everyone! 👋 Join us for another collaborative learning session hosted by Harsha Koushik & sammy on threat modeling. The Discord space will be happening today at 5pm. Don't miss out, see you there! linkedin.com/posts/hkoushik…

Kubesploit (@kubesploit) 's Twitter Profile Photo

This article argues, and demonstrates that Distroless containers are not immune to unconventional hacking methods just because shell programs aren't included in the image ➤ medium.com/@hkoushik/abus…

This article argues, and demonstrates that Distroless containers are not immune to unconventional hacking methods just because shell programs aren't included in the image

➤ medium.com/@hkoushik/abus…
Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

Don’t miss Harsha Koushik and Anand Tiwari demo of Cloud Native Breach and Attack Simulation (COBRA) at DEF CON 32! Learn how this open-source tool simulates multi-cloud attacks, assesses security controls, and provides actionable insights. #CloudVillage #CyberSecurity

Don’t miss <a href="/0xlcheetah/">Harsha Koushik</a> and <a href="/anandtiwarics/">Anand Tiwari</a> demo of Cloud Native Breach and Attack Simulation (COBRA) at <a href="/defcon/">DEF CON</a> 32!

Learn how this open-source tool simulates multi-cloud attacks, assesses security controls, and provides actionable insights.

#CloudVillage #CyberSecurity
Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

Join Seth Art workshop at DEF CON 32! Learn how attackers compromise cloud environments and what post-exploitation looks like. Get hands-on experience with an AWS account filled with intentionally vulnerable resources. Good for all skill levels! #DEFCON32 #CloudVillage #AWS

Join <a href="/sethsec/">Seth Art</a> workshop at <a href="/defcon/">DEF CON</a> 32! 
Learn how attackers compromise cloud environments and what post-exploitation looks like. Get hands-on experience with an AWS account filled with intentionally vulnerable resources. Good for all skill levels! 

#DEFCON32 #CloudVillage #AWS
Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

Harsha Koushik and, Anand Tiwari is going to present their tool "Cloud Offensive Breach and Risk Assessment (COBRA)" starting in next few minutes. Grab your seats before it gets full house. #dc32 #defcon32

KubeFM (@k8sfm) 's Twitter Profile Photo

🗣️ Harsha Koushik, a Security Researcher at Palo Alto Networks, explores the intricacies of Kubernetes security, focusing on the benefits and misconceptions of Distroless container images kube.fm/abusing-distro… 🌟 Learnk8s 🎙 Bart Farrell

Rohit Salecha (@salecharohit) 's Twitter Profile Photo

🌟 Open Sourcing my training 'Securing the 4C's of a Software Product'! 🚀 Check it out: rohitsalecha.com/s4cp/ Learn how to secure Code, Containers, Clusters, and Cloud ☁️ through a defensive approach by bootstrapping security into your entire stack. 🔐

🌟 Open Sourcing my training 'Securing the 4C's of a Software Product'! 🚀 Check it out: rohitsalecha.com/s4cp/
Learn how to secure Code, Containers, Clusters, and Cloud ☁️ through a defensive approach by bootstrapping security into your entire stack. 🔐
Rohit Salecha (@salecharohit) 's Twitter Profile Photo

🚀 Developers, ready to boost security in your product? 🛡️ 🔐 Dive into Product Security with my free & open-source training! ✅ Code ✅ Container ✅ Cluster ✅ Cloud 🎥 Watch the full course here: youtube.com/watch?v=Am9417… 🔒 Let’s build secure software together!

Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

We are back in the saddle with the next set of videos! Here's an amazing Tool Demo by Anand Tiwari and Harsha Koushik on Cloud Offensive Breach and Risk Assessment (COBRA) - youtu.be/TKJEzYxPB34 Subscribe to get regular YouTube notifications. Happy Viewing! #CloudSecurity