<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Security Research and Advocacy @ Datadog. Former Principal and Cloud Penetration Testing lead @BishopFox. I like to build, break, learn, and share.  CloudFox, CloudFoxable, BadPods, IAM Vulnerable</description><link>https://bsky.app/profile/sethsec.bsky.social</link><title>@sethsec.bsky.social - Seth Art</title><item><link>https://bsky.app/profile/sethsec.bsky.social/post/3lhyncrz4vs2y</link><description>I’m excited to share our research on the “whoAMI” attack. We discovered that AWS customers pulling AMI IDs insecurely could accidentally use malicious images instead of the legitimate ones— leading to remote code execution. &#xA;&#xA;https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/</description><pubDate>12 Feb 2025 16:56 +0000</pubDate><guid isPermaLink="false">at://did:plc:ebvszruszuar55jfkinjwj2s/app.bsky.feed.post/3lhyncrz4vs2y</guid></item><item><link>https://bsky.app/profile/sethsec.bsky.social/post/3lbkqbiopu22b</link><description>The November edition of the Datadog Security Digest is live! &#xA;https://securitylabs.datadoghq.com/newsletters/november-2024/&#xA; &#xA;Featuring: &#xA;- Exploring Google Cloud default service accounts: deep dive and real-world adoption trends by Christophe Tafani-Dereeper&#xA;🧵(1/3)</description><pubDate>22 Nov 2024 19:40 +0000</pubDate><guid isPermaLink="false">at://did:plc:ebvszruszuar55jfkinjwj2s/app.bsky.feed.post/3lbkqbiopu22b</guid></item></channel></rss>