Pwned Labs Blog
The latest techniques in hacking and defending
- Ian Austin
- March 13, 2026
AWS S3 has long suffered from the bucketsquatting problem. Because bucket names lived in a single global namespace,...
- Ian Austin
- March 11, 2026
Many people want to know "how do I get started with AWS security?", and this blog post is for them. The pathway in this...
- Rob Alport
- May 20, 2025
From building military-grade networks to cloud security guardrails, Tyler's journey into cybersecurity has been...
- Rob Alport
- April 25, 2025
We sat down with Filip Jodoin, Penetration Tester and Pwned Labs instructor, to find out more about his cybersecurity...
- Goodness Adediran
- March 11, 2025
Disclaimer: The information in this blog post is provided for educational and informational purposes only. We do not...
- Tyler Petty
- March 6, 2025
Cloud Security Researcher and Advocate, Seth Art, recently published the blog post whoAMI: A cloud image name confusion...
- Marios Pappas
- December 10, 2024
Join us in this new blog post as we explore the various methods that threat actors commonly use to move laterally and...
- Tyler Petty
- November 16, 2024
AWS recently introduced Resource Control Policies (RCPs), powerful guardrails designed to enhance your organization’s...
- Marios Pappas
- October 22, 2024
Join us in this blog post as we explore various methods that threat actors commonly use to gain initial access to Azure.
- Ayush Singh
- June 20, 2024
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lateral movement in a...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.