Bleon Proko (@gl4ssesbo1) 's Twitter Profile
Bleon Proko

@gl4ssesbo1

π//9e
Cloud Researcher @permisosecurity
Infosec Person. Creator of Nebula (github.com/gl4ssesbo1/Neb…)

ID: 1110225331955339265

linkhttps://www.pepperclipp.com/ calendar_today25-03-2019 17:02:00

1,1K Tweet

295 Takipçi

1,1K Takip Edilen

SANS Cloud Security (@sanscloudsec) 's Twitter Profile Photo

Join us at #SANSHackFest when Bleon Proko & Andrew Kraut discuss bypassing AWSCompromisedKeyQuarantineV2. Learn how attackers can still escalate, persist, and wreak havoc even after credentials are leaked. ➡️ View Agenda & Save Your Spot: sans.org/u/1vBt #CloudSecurity

Join us at #SANSHackFest when <a href="/gl4ssesbo1/">Bleon Proko</a> &amp; Andrew Kraut discuss bypassing AWSCompromisedKeyQuarantineV2. Learn how attackers can still escalate, persist, and wreak havoc even after credentials are leaked.

➡️ View Agenda &amp; Save Your Spot: sans.org/u/1vBt

#CloudSecurity
Ano1𝕏 (@ano1x8) 's Twitter Profile Photo

Incredible Day 2 talks /fol: Yarden Shafir Taylor Lee Leswee LLC @markofu Kevin Ott x jon Bleon Proko Jason Ostrom x Chris Lo Tracecat Alyse My honest Irish/Dutch opinion, 10/10 💎 every talk, the entire exp; hoping for another summit in the future in LA 💜

ISOC Live (@isoc_live) 's Twitter Profile Photo

VIDEO: BSidesNYC 2024 - Breaking free from the chains of fate – Bypassing AWSCompromisedKeyQuarantineV2 Policy - Bleon Proko Bleon Proko Opie Opie Permiso Security youtu.be/fYwG0s9uY0w?li… #BSidesNYC #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #AWS

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

Now at WWHF Bleon Proko is going over DetentionDodger, a tool designed to find users whose credentials have been leaked/compromised and the impact they have on the target. github.com/Permiso-io-too…

Wietze (@wietze) 's Twitter Profile Photo

Last week I had the pleasure of meeting / spending time with various cyber heroes, including Chris Spehn Olaf Hartong @subTee Keith Bleon Proko Cat at #wwhf - give them a follow if you aren't already! #ff

Permiso Security (@permisosecurity) 's Twitter Profile Photo

As part of recapping the TEN open-source tools Permiso launched in 2024, today we're covering #YetiHunter! YetiHunter was developed by Bleon Proko and 1aN0rmus to help security teams detect and hunt for suspicious activity in Snowflake environments. It includes indicators

As part of recapping the TEN open-source tools Permiso launched in 2024, today we're covering #YetiHunter! YetiHunter was developed by <a href="/gl4ssesbo1/">Bleon Proko</a>  and <a href="/TekDefense/">1aN0rmus</a> to help security teams detect and hunt for suspicious activity in Snowflake environments. It includes indicators
Bleon Proko (@gl4ssesbo1) 's Twitter Profile Photo

Thank you AWS Security Digest for including AWS Quarantine Policy Bypass article in your issues (issue #182). Happy to have one of my articles be endorsed by you.

Wild West Hackin' Fest (@wwhackinfest) 's Twitter Profile Photo

Check out Bleon Proko 's talk, "Encrypting Buckets for Compliance and Ransom - How Attackers Can Use KMS to Ransomware S3 Buckets," from Wild West Hackin' Fest @ Mile High 2025! Grab yer tickets for WWHF - Deadwood 2025! --> wildwesthackinfest.com/wild-west-hack… youtube.com/watch?v=g-sHkS…

Permiso Security (@permisosecurity) 's Twitter Profile Photo

We are incredibly honored to be named the winner of The Most Promising Early Stage Start Up category in the SC Media SC Awards. This is a great testament to the hard work of the entire Permiso team, and the value our customers see in our solution. scworld.com/news/sc-awards…

Wietze (@wietze) 's Twitter Profile Photo

#HuntingTipOfTheDay: explorer.exe /root,"c:/your/file.exe" will spawn your exe from the main explorer.exe, not a new one. This breaks normal process chains. Hunt for explorer.exe with "/root", as well as explorer spawning unusual children (e.g. rundll32, mshta, powershell).

#HuntingTipOfTheDay: explorer.exe /root,"c:/your/file.exe" will spawn your exe from the main explorer.exe, not a new one. This breaks normal process chains. Hunt for explorer.exe with "/root", as well as explorer spawning unusual children (e.g. rundll32, mshta, powershell).
Exaforce (@exaforceai) 's Twitter Profile Photo

Triage shouldn’t be the majority of your SOC’s time and effort. See how AI slashes false positives, speeds up alert handling, and delivers better context for every analyst tier. Read the blog: exaforce.com/blogs/fixing-t… #CyberSecurity #SOC #AI #SecOps #IncidentResponse

Exaforce (@exaforceai) 's Twitter Profile Photo

The s1ngularity supply-chain attack compromised npm Nx packages, stealing sensitive developer assets. Exaforce confirmed zero customer impact & added new risk rules proactively. Read more: exaforce.com/blogs/s1ngular…

Exaforce (@exaforceai) 's Twitter Profile Photo

New research: Attackers slipped malicious code into popular NPM packages to hijack crypto wallets. Bleon Proko dives deep into how it worked & what to do next: bit.ly/3V7xbDS #SupplyChainSecurity #NPM #Crypto

Exaforce (@exaforceai) 's Twitter Profile Photo

New research from Bleon Proko: Ghost in the Script Attackers can abuse hidden Google Apps Script projects to persist in GCP. Learn how the technique works and how to detect it. Read more: bit.ly/3I6v4gv

Exaforce (@exaforceai) 's Twitter Profile Photo

New from GigaOm: The 2025 Radar for SecOps Automation is here. Discover how AI-driven automation is transforming SOC workflows, market leaders, and what’s next for the SOC. Read the full report: exaforce.com/downloads/giga… #SecOps #AISOC #CyberSecurity

Exaforce (@exaforceai) 's Twitter Profile Photo

Thrilled to announce that Exaforce has been selected for the 2025 AWS Generative AI Accelerator! 🚀 AWS Startups #AWS #AWSStartups #GenerativeAI #AWSAccelerator #AISOC

Thrilled to announce that Exaforce has been selected for the 2025 AWS Generative AI Accelerator! 🚀 <a href="/AWSstartups/">AWS Startups</a> 

#AWS #AWSStartups #GenerativeAI #AWSAccelerator #AISOC
Cloud Security Podcast (@cloudsecpod) 's Twitter Profile Photo

🧠 “Can I just vibe-code an AI SOC?” “If you’re starting from scratch - building data platforms + layers, that might not be worth it.” — Ariful Huq Exaforce Tools ≠ architecture. 🎙 Cloud Security Podcast #AISecurity #SOC