kat traxler ๐ŸŽ—๏ธ (@nightmarejs) 's Twitter Profile
kat traxler ๐ŸŽ—๏ธ

@nightmarejs

proficient at drawing the rest of the ๐Ÿฆ‰ | insufferable triple Virgo โ™๏ธ youtube.com/@ThereisNoMagiโ€ฆ

ID: 700364678

linkhttps://kattraxler.cloud calendar_today17-07-2012 04:35:39

8,8K Tweet

1,1K Followers

3,3K Following

kat traxler ๐ŸŽ—๏ธ (@nightmarejs) 's Twitter Profile Photo

This #bugswat was one for the record books. Yes they awarded a lot of dough but the company we kept was โœจ #bugbounty #googlecloud bughunters.google.com/blog/536440198โ€ฆ

ืขืžื™ื—ื™ ืฉื™ืงืœื™ - Amichai Chikli (@amichaichikli) 's Twitter Profile Photo

The first victim on 9/11 was Daniel Lewin, Israeli-born, former IDF special forces officer, and co-founder of Akamai Technologies. Sitting just rows behind the hijackers on Flight 11, he tried to fight back and was stabbed to death before the plane struck the North Tower. Daniel, a pioneer

The first victim on 9/11 was Daniel Lewin, Israeli-born, former IDF special forces officer, and co-founder of <a href="/Akamai/">Akamai Technologies</a>.

Sitting just rows behind the hijackers on Flight 11, he tried to fight back and was stabbed to death before the plane struck the North Tower.

Daniel, a pioneer
kat traxler ๐ŸŽ—๏ธ (@nightmarejs) 's Twitter Profile Photo

๐ŸŽ‰๐ŸฅณMy latest whitepaper has been nearly a year in the making and itโ€™s finally out! ๐ŸŽ‰๐Ÿฅณ If youโ€™re curious about those robot accounts owned and operated by your CSP, how theyโ€™re architected and your risk when using them. This paper is for you. A huge thanks to the many friends

Vectra AI (@vectra_ai) 's Twitter Profile Photo

Machine identities are the backbone of cloud automation, but also a growing attack surface. Our latest whitepaper, authored by Kat Traxler (kat traxler ๐ŸŽ—๏ธ),ย compares how AWS, Google Cloud, and Microsoft manage non-human identities, and uncovers the unique risks each approach

Machine identities are the backbone of cloud automation, but also a growing attack surface.

Our latest whitepaper, authored by Kat Traxler (<a href="/NightmareJS/">kat traxler ๐ŸŽ—๏ธ</a>),ย compares how AWS, Google Cloud, and Microsoft manage non-human identities, and uncovers the unique risks each approach
Dr. Anton Chuvakin (@anton_chuvakin) 's Twitter Profile Photo

So, if you are willing to read the whole thing, here it is: research.google/pubs/security-โ€ฆ (18 pages); I will eventually finish my blog about it, would be handy for the attention-challenged :-)

kat traxler ๐ŸŽ—๏ธ (@nightmarejs) 's Twitter Profile Photo

Excited to be presenting next week at #SecTor #Blackhat Come see me at the Cloud Security Summit, September 30th - 10:20am Black Hat blackhat.com/sector/2025/suโ€ฆ

Excited to be presenting next week at #SecTor #Blackhat

Come see me at the Cloud Security Summit, September 30th - 10:20am

<a href="/BlackHatEvents/">Black Hat</a> 

blackhat.com/sector/2025/suโ€ฆ
BSides Pyongyang (@bsidespyongyang) 's Twitter Profile Photo

Mark the calendar for 18 November 2025. #BSidesPyongyang promises inspiring talks and fresh ideas for everyone. Join a global audience on 18 November 2025 for a virtual conference featuring insightful speakers and new perspectives. Stay tuned for registration information

Mark the calendar for 18 November 2025.

#BSidesPyongyang promises inspiring talks and fresh ideas for everyone. Join a global audience on 18 November 2025 for a virtual conference featuring insightful speakers and new perspectives.

Stay tuned for registration information