| Date | Title | Notes |
|---|---|---|
| Aug 2025 | DEFCON 33 Cloud Village CTF | Created Cloud Walker Challenge (AWS & Azure persistence and lateral movement) |
| Aug/Apr 2025 | Storm-2372 Attack POC | Demo in RSA 2025, DEFCON 33 Cloud Village talks |
| Sep 2024 | Cloud Tripwires POC | Related to DEF CON 32 Cloud Village talk |
| Aug 2024 | DEFCON 32 Cloud Village CTF | Created Identity Quest Challenge (Azure Device Code Phishing, Sub-Tenant, SP Abuse) |
| Aug 2023 | DEFCON 31 Cloud Village CTF | Created Source of Your Troubles (AWS Lambda Priv Esc) + Oldie But Goodie Challenges (IAM Versioning Priv Esc) |
| Aug 2021 | OAuth Device Code Flow Phishing Attack POC | Demo in DEF CON 29 talk |
| Date | Title | Publication | Site | Type |
|---|---|---|---|
| Sep 2024 | Effective C2 Beaconing Detection | Netskope | Whitepaper |
| Jul 2024 | Cloud and Threat Report: AI Apps in the Enterprise | Netskope | Report |
| May 2024 | Analysing and managing risk from third-party OAuth application access | Cyber Security: A Peer-Reviewed Journal, Volume 7 (2023-24), Henry Stewart Publications | Peer‑Review |
| Date | Title | Organization |
|---|---|---|
| Jan 22 2024 | Interview: Guardians of the Internet: Cybersecurity for Business Leaders | Radio BFM 89.9, Kuala Lumpur, Malaysia, Richard Bradbury |