kat traxler 🎗️ (@nightmarejs) 's Twitter Profile
kat traxler 🎗️

@nightmarejs

proficient at drawing the rest of the 🦉 | insufferable triple Virgo ♍️ youtube.com/@ThereisNoMagi…

ID: 700364678

linkhttps://kattraxler.cloud calendar_today17-07-2012 04:35:39

8,8K Tweet

1,1K Takipçi

3,3K Takip Edilen

kat traxler 🎗️ (@nightmarejs) 's Twitter Profile Photo

This #bugswat was one for the record books. Yes they awarded a lot of dough but the company we kept was ✨ #bugbounty #googlecloud bughunters.google.com/blog/536440198…

עמיחי שיקלי - Amichai Chikli (@amichaichikli) 's Twitter Profile Photo

The first victim on 9/11 was Daniel Lewin, Israeli-born, former IDF special forces officer, and co-founder of Akamai Technologies. Sitting just rows behind the hijackers on Flight 11, he tried to fight back and was stabbed to death before the plane struck the North Tower. Daniel, a pioneer

The first victim on 9/11 was Daniel Lewin, Israeli-born, former IDF special forces officer, and co-founder of <a href="/Akamai/">Akamai Technologies</a>.

Sitting just rows behind the hijackers on Flight 11, he tried to fight back and was stabbed to death before the plane struck the North Tower.

Daniel, a pioneer
kat traxler 🎗️ (@nightmarejs) 's Twitter Profile Photo

🎉🥳My latest whitepaper has been nearly a year in the making and it’s finally out! 🎉🥳 If you’re curious about those robot accounts owned and operated by your CSP, how they’re architected and your risk when using them. This paper is for you. A huge thanks to the many friends

Vectra AI (@vectra_ai) 's Twitter Profile Photo

Machine identities are the backbone of cloud automation, but also a growing attack surface. Our latest whitepaper, authored by Kat Traxler (kat traxler 🎗️), compares how AWS, Google Cloud, and Microsoft manage non-human identities, and uncovers the unique risks each approach

Machine identities are the backbone of cloud automation, but also a growing attack surface.

Our latest whitepaper, authored by Kat Traxler (<a href="/NightmareJS/">kat traxler 🎗️</a>), compares how AWS, Google Cloud, and Microsoft manage non-human identities, and uncovers the unique risks each approach
Dr. Anton Chuvakin (@anton_chuvakin) 's Twitter Profile Photo

So, if you are willing to read the whole thing, here it is: research.google/pubs/security-… (18 pages); I will eventually finish my blog about it, would be handy for the attention-challenged :-)

kat traxler 🎗️ (@nightmarejs) 's Twitter Profile Photo

Excited to be presenting next week at #SecTor #Blackhat Come see me at the Cloud Security Summit, September 30th - 10:20am Black Hat blackhat.com/sector/2025/su…

Excited to be presenting next week at #SecTor #Blackhat

Come see me at the Cloud Security Summit, September 30th - 10:20am

<a href="/BlackHatEvents/">Black Hat</a> 

blackhat.com/sector/2025/su…
BSides Pyongyang (@bsidespyongyang) 's Twitter Profile Photo

Mark the calendar for 18 November 2025. #BSidesPyongyang promises inspiring talks and fresh ideas for everyone. Join a global audience on 18 November 2025 for a virtual conference featuring insightful speakers and new perspectives. Stay tuned for registration information

Mark the calendar for 18 November 2025.

#BSidesPyongyang promises inspiring talks and fresh ideas for everyone. Join a global audience on 18 November 2025 for a virtual conference featuring insightful speakers and new perspectives.

Stay tuned for registration information