Yakir Kadkoda (@yakirkad) 's Twitter Profile
Yakir Kadkoda

@yakirkad

๐Ÿงฉ Lead Security Researcher at @AquaSecTeam | Black Hat USA | ASIA, DEFCON Speaker

ID: 1469759292798603266

calendar_today11-12-2021 20:01:47

127 Tweet

370 Followers

465 Following

Yakir Kadkoda (@yakirkad) 's Twitter Profile Photo

Thrilled to share that we'll be presenting our research at Black Hat Vegas Briefings and Arsenal! We'll reveal critical AWS vulnerabilities and showcase our vulnerability hunting tool. More details: blackhat.com/us-24/briefingโ€ฆ blackhat.com/us-24/arsenal/โ€ฆ #BlackHat #BHUSA Black Hat

Thrilled to share that we'll be presenting our research at Black Hat Vegas Briefings and Arsenal! We'll reveal critical AWS vulnerabilities and showcase our vulnerability hunting tool. More details: blackhat.com/us-24/briefingโ€ฆ blackhat.com/us-24/arsenal/โ€ฆ #BlackHat #BHUSA <a href="/BlackHatEvents/">Black Hat</a>
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿ’ง Secrets leaking from employee *personal* GitHub repos โ†’ 66% of the valid secrets Aqua Security found + examples including finding privileged Azure container registry tokens and Red Hat container registry tokens aquasec.com/blog/github-reโ€ฆ

KubeFM (@k8sfm) 's Twitter Profile Photo

In this KubeFM episode, Yakir Kadkoda and Assaf from Aqua Security explore how a robust Kubernetes secrets strategy is necessary to prevent leaks and maintain a strong security posture kube.fm/exposed-secretโ€ฆ ๐ŸŒŸ Sponsor Isovalent ๐ŸŽ™๏ธ with Bart Farrell

Aqua Security (@aquasecteam) 's Twitter Profile Photo

๐Ÿ“ข Get ready for an eye-opening session at #CloudNativeCon on June 26th in Seattle! Our very own Yakir Kadkoda, Lead Security Researcher at Aqua, will explore critical threats in the Development Ecosystem. Discover the hidden dangers and learn how to protect your cloud native

๐Ÿ“ข Get ready for an eye-opening session at #CloudNativeCon on June 26th in Seattle! Our very own <a href="/YakirKad/">Yakir Kadkoda</a>, Lead Security Researcher at Aqua, will explore critical threats in the Development Ecosystem.

Discover the hidden dangers and learn how to protect your cloud native
Aqua Security (@aquasecteam) 's Twitter Profile Photo

๐Ÿšจ Think your secrets are safe? Think again. Aqua Nautilus' groundbreaking research reveals widespread exposure of enterprise secrets in leading Source Code Management Systems. The combination of poor coding practices and Git-based system behavior has led to long-term secrets

Black Hat (@blackhatevents) 's Twitter Profile Photo

#BHUSA Briefing "Breaching AWS Accounts Through Shadow Resources" will present six critical vulnerabilities found in AWS, along with the stories and methodologies behind them. Register here>> bit.ly/3VFE9j9

#BHUSA Briefing "Breaching AWS Accounts Through Shadow Resources" will present six critical vulnerabilities found in AWS, along with the stories and methodologies behind them. 

Register here&gt;&gt; bit.ly/3VFE9j9
Yakir Kadkoda (@yakirkad) 's Twitter Profile Photo

In our latest research, We have identified new ways secrets hide in codebases due to blind spots in secret scanning tools and design choices of Git and SCMs. We uncovered many findings, including Mozilla's infra tokens, Fortune 500 tokens, and more - aquasec.com/blog/undetecteโ€ฆ

Yakir Kadkoda (@yakirkad) 's Twitter Profile Photo

Excited to announce our talk at DEF CON: "Breaching AWS Accounts Through Shadow Resources". We'll reveal new AWS vulnerabilities and attack vectors. Stay tuned! #DEFCON32 #DEFCON Michael Ofek itach

Excited to announce our talk at <a href="/defcon/">DEF CON</a>: "Breaching AWS Accounts Through Shadow Resources".
We'll reveal new AWS vulnerabilities and attack vectors. Stay tuned! #DEFCON32 #DEFCON
<a href="/mike_katch/">Michael</a> <a href="/ofekitach/">Ofek itach</a>
Shaked Klein Orbach ๐Ÿ‡ฎ๐Ÿ‡ฑ (@shakedko) 's Twitter Profile Photo

ืืž;ืœืง: Yakir Kadkoda, Ilay Goldman ืž Aqua Security ืขืฉื• ืžื—ืงืจ ืžืจืชืง ืขืœ ืกื™ืงืจื˜ื™ื ืฉืœื ื ื™ืชื ื™ื ืœืื™ืชื•ืจ ืขืดื™ ื”ืกื•ืจืงื™ื ื”ื ืคื•ืฆื™ื ื›ื™ื•ื. ื”ืฆื•ื•ืช ื’ื™ืœื” ืงืจื“ื ืฉื™ืœืก ืœืกื‘ื™ื‘ื•ืช ืขื ืŸ, ืชืฉืชื™ื•ืช ืคื ื™ืžื™ื•ืช, ืคืœื˜ืคื•ืจืžื•ืช ื˜ืœืžื˜ืจื™ื•ืช, ืจืฉืชื•ืช, ืžืฆืœืžื•ืช ื•ืขื•ื“, ื—ืฉื•ืคื™ื ืœืขื•ืœื. ืžื—ืงืชื ืืช ื”ืกื™ืงืจื˜? ื—ื•ืฉื‘ื™ื ืฉื–ื” ืžืกืคื™ืง? ืื•ืœื™ ื›ื“ืื™ ืœื›ื ืœืฆืœื•ืœ >>

Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿ“š tl;dr sec 244 โ˜๏ธ Cloud Security Slides Nick Frichette, Seth Art, Jenko Hwong โœ๏ธ Threat Modeling ๐Ÿ’ผ Security Program Templates Robert A. ๐Ÿง‘โ€๐Ÿ’ผ Security Training Tips Phil Venables ๐Ÿฆˆ TrailShark Yakir Kadkoda, Ofek itach tldrsec.com/p/tldr-sec-244

Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿฆˆ TrailShark: Understanding AWS API and Service Interactions A plugin that connects Wireshark with AWS CloudTrail, offering near-real-time analysis of AWS API calls โ†’ Capture and examine the internal API calls triggered by AWS services โ†’ Used by Aqua Security's Ofek itach &