Andi Ahmeti (@seceagleand1) 's Twitter Profile
Andi Ahmeti

@seceagleand1

Threat Researcher @permisosecurity

ID: 1752449322019356672

calendar_today30-01-2024 21:51:02

75 Tweet

49 Followers

77 Following

Permiso Security (@permisosecurity) 's Twitter Profile Photo

Just a few short days away from fwd:cloudsec! -Michael Newar, Andrew Kraut and Jared Elder will be at the booth. -Nathan Eades is taking the stage at 10:30AM on Monday. Come check out his talk: fwdcloudsec.org/conference/nor… -After a long day of conferencing, come hang out with our

Just a few short days away from fwd:cloudsec!
-Michael Newar, Andrew Kraut and Jared Elder will be at the booth.
-Nathan Eades is taking the stage at 10:30AM on Monday. Come check out his talk: fwdcloudsec.org/conference/nor…
-After a long day of conferencing, come hang out with our
Permiso Security (@permisosecurity) 's Twitter Profile Photo

Check out Permiso P0 Labs’ latest research about AWS Managed Active Directory compliments of Bleon Proko! Turns out AD default settings inherited from on-prem AD can lead to a Resource-Based Constrained Delegation (RBCD) attack in its Cloud counterpart. permiso.io/blog/abusing-d…

Check out Permiso P0 Labs’ latest research about AWS Managed Active Directory compliments of Bleon Proko!

Turns out AD default settings inherited from on-prem AD can lead to a Resource-Based Constrained Delegation (RBCD) attack in its Cloud counterpart.

permiso.io/blog/abusing-d…
BSides Tirana (@bsidestirana) 's Twitter Profile Photo

We’re excited to have Andi Ahmeti, Threat Researcher at Permiso Security speaking at #BSidesTirana2025 on the 19th of September! #BSidesTirana #BSides #speakers

We’re excited to have <a href="/SecEagleAnd1/">Andi Ahmeti</a>, Threat Researcher at Permiso Security speaking at #BSidesTirana2025 on the 19th of September!

#BSidesTirana #BSides #speakers
Permiso Security (@permisosecurity) 's Twitter Profile Photo

Attackers are finding new ways to hide in plain sight. That’s why Permiso built Inboxfuscation - a free, open-source obfuscation and detection framework to help security teams detect and stop Unicode-obfuscated Microsoft Exchange inbox rules. It includes modules for both

Attackers are finding new ways to hide in plain sight.

That’s why Permiso built Inboxfuscation - a free, open-source obfuscation and detection framework to help security teams detect and stop Unicode-obfuscated Microsoft Exchange inbox rules.

It includes modules for both
SC Media (@scmagazine) 's Twitter Profile Photo

Malicious Microsoft Exchange inbox rules could be hidden using a technique dubbed “Inboxfuscation,”Permiso Security researchers reported. #cybersecurity #infosec #ITsecurity bit.ly/465HDlG

Permiso Security (@permisosecurity) 's Twitter Profile Photo

Two Permiso speakers on the international stage tomorrow: Andi Ahmeti will be presenting "Inbox Under Siege: Real-World BEC Attacks, Tactics & Lessons Learend" at BSides Tirana tomorrow at 3:40 local time. Daniel Bohannon will be presenting "SkyScalpel: Making & Breaking

Two Permiso speakers on the international stage tomorrow:
Andi Ahmeti will be presenting "Inbox Under Siege: Real-World BEC Attacks, Tactics &amp; Lessons Learend" at <a href="/BSidesTirana/">BSides Tirana</a> tomorrow at 3:40 local time.

<a href="/danielhbohannon/">Daniel Bohannon</a> will be presenting "SkyScalpel: Making &amp; Breaking
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evades Detection Read more: cybersecuritynews.com/inboxfuscation… Attackers increasingly exploit Microsoft Exchange inbox rules to maintain persistence and exfiltrate data within enterprise environments. Inboxfuscation

🚨 Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evades Detection 

Read more: cybersecuritynews.com/inboxfuscation…

Attackers increasingly exploit Microsoft Exchange inbox rules to maintain persistence and exfiltrate data within enterprise environments.

Inboxfuscation
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

💡This tool on GitHub is only 2 weeks old, first seen on September 10th, 2025. Inboxfuscation: An advanced offensive & defensive framework for mailbox rule obfuscation & detection in Exchange environments. GitHub: github.com/Permiso-io-too… Release Blog: permiso.io/blog/inboxfusc…

💡This tool on GitHub is only 2 weeks old, first seen on September 10th, 2025.

Inboxfuscation: An advanced offensive &amp; defensive framework for mailbox rule obfuscation &amp; detection in Exchange environments.

GitHub: github.com/Permiso-io-too…

Release Blog: permiso.io/blog/inboxfusc…
Andi Ahmeti (@seceagleand1) 's Twitter Profile Photo

Love seeing our work at @PermisoSecurity being shared with the community! I had the chance to develop Inboxfuscation an open-source tool to detect malicious inbox rules. Excited to see it getting out there!

Permiso Security (@permisosecurity) 's Twitter Profile Photo

Great write up from the Cyber Security News on our latest open-source tool, #Inboxfuscation, in their newsletter today. "A new open-source tool named Inboxfuscation can create malicious inbox rules in Microsoft Exchange that are difficult for security tools to detect. Developed by

Permiso Security (@permisosecurity) 's Twitter Profile Photo

⚡️AI adoption is outpacing security. Permiso delivers **complete visibility** into AI users, builders & agents with runtime intelligence that stops hidden threats. Blog post here: hubs.la/Q03LtT7Z0

⚡️AI adoption is outpacing security.

Permiso delivers **complete visibility** into AI users, builders &amp; agents with runtime intelligence that stops hidden threats.

Blog post here: hubs.la/Q03LtT7Z0
Permiso Security (@permisosecurity) 's Twitter Profile Photo

Cloud logs all speak a different language. AWS ≠ GCP ≠ SaaS ≠ IdP. P0LR Espresso is an open source tool that normalizes logs across environments so defenders get fast, strong shots of context during live response. Read more: hubs.la/Q03M4GfF0

Permiso Security (@permisosecurity) 's Twitter Profile Photo

AI security makes more sense when you see it through identity. Ian Ahl explains why most “AI incidents” come down to stolen creds, OAuth abuse, and over-privileged accounts and how to fix it with Discover. Protect. Defend. Stream now: hubs.ly/Q03Nv3SK0