We explore what generative AI means for canaries, deception and honeypots. Both from an offense and defense perspective and what we're doing at Tracebit.| Tracebit Research
We’re excited to share our latest canary module: Kubernetes - this now available for all Tracebit customers| Tracebit Research
We explore why there can be a bias to build canaries and what's actually involved for a successful security canary program.| Tracebit Research
A selection of use cases to consider when deploying security canaries, considering the Security Canary Maturity Model.| Tracebit Research
The role of automated moving target defence in protection against attacks.| Tracebit Research
We announce Tracebit’s partnership with Panther, a leading cloud-native SIEM| Tracebit Research
We share a - now fixed - AWS vulnerability that would have enabled potentially undetectable data exfiltration from even the most locked down of AWS accounts by leveraging the audit trail itself to stealthily leak data.| Tracebit Research
We lay out the different levels of maturity your organization may be at in their Security Canary Maturity, as well as discussing the value in maturity models themselves.| Tracebit Research
We investigate three recent AWS security incidents and discuss how canaries could help you detect these early, and throughout the attack lifecycle.| Tracebit Research
Our latest research into VPC Endpoint Policy causes AWS to introduce significant changes!| Tracebit Research
Is GuardDuty all you need for AWS threat detection? We’ve asked our friend Rami McCarthy to dive into GuardDuty’s performance and consider the potential place for Canary Infrastructure.| Tracebit Research
We're delighted to announce our seed funding round, we're partnering with Accel, Tapestry VC and an incredible set of angel investors to bring Tracebit to the world.| Tracebit Research
Our Co-Founder and CTO Sam Cox presented his research into discovering the AWS Account ID of any S3 Bucket and how you might make similar discoveries yourself.| Tracebit Research
We share the lessons learned from deploying canaries at scale - how to be thoughtful but pragmatic about some of the tradeoffs necessary.| Tracebit Research
What to think about when implementing canary AWS credentials in 2024 and beyond| Tracebit Research
Laying out why we think 'Canary Infra' is a game changer for honeypots and intrusion detection.| Tracebit Research
A technique to find the Account ID of a private S3 bucket.| Tracebit Research
Investigating how long CloudTrail takes to deliver events in 2023.| Tracebit Research
A deepdive into what Honeypots are, why they're useful and how they're used for intrusion detection.| Tracebit Research
A retro on some of the reasons we chose to build Tracebit in C#.| Tracebit Research
Tracebit announces the general availability of Tracebit Canaries for Microsoft Azure| Tracebit Research
We share a few inconsistencies found in Azure logs which make detection engineering more challenging.| tracebit.com
Tracebit deploys and maintains tailored security canaries, proactively detecting intrusions across your organization - from the cloud infrastructure, to identity and endpoints.| tracebit.com
Tracebit discovered a silent attack on Gemini CLI where, through a toxic combination of prompt injection, misleading UX and missing validation, inspecting untrusted code consistently leads to execution of malicious commands - enabling silent credential theft and much more.| tracebit.com