● SYSTEM_STATUS: ACTIVE // RESEARCH_MODE

Chen Shiri: Cybersecurity Researcher • Speaker • Engineer

I explore, break, and explain modern systems – from cloud infrastructure to AI and share the thinking behind real-world security research.

AUTH_TOKEN: 0x8F22… 

LOCATION: TEL_AVIV_GLOBAL

TRUSTED BY LEADING FIRMS & GLOBAL CONFERENCES

ACCENTURE

George Mason University 

BSides

Hacktivity

JFrog

AUTHORITY_PROFILE

Technical Authority & World Impact

Chen Shiri is a cybersecurity researcher and hacker known for research on low-level security and isolation mechanisms. His research has revealed significant flaws in widely used services impacting millions of users worldwide and shaping security best practices across the industry. Frequently cited by major news outlets and presenting at top security conferences globally.

01 // CORE_MISSION

What I Do

Cybersecurity Research

Discovery and analysis of complex vulnerabilities in cloud-native environments, containers, and AI-driven systems.

VULN_DISCOVERYCLOUD_SEC

Systems Thinking

Deconstructing the architecture of modern infrastructure to understand not just the holes, but the logic behind them.

INFRASTRUCTURELogic

Speaking & Education

Translating complex technical findings into actionable insights for global conferences and professional workshops.

KEYNOTESMentorship

Building ByteBuzz

Developing a hands-on learning platform designed for builders who want to master security by breaking real systems.

PROD_DEVLabs

02 // KNOWLEDGE_BASE

Featured Content

VIDEO // 14:22

The Kubernetes Mistakes That Led to My CNCF Talk

Exploring the critical misconfigurations that allowed me to gain cluster-wide privileges during a routine audit.

ARTICLE // 8 MIN READ

Why most cloud systems are insecure

A deep dive into the shared responsibility model and why the biggest threats are often the most overlooked

RESEARCH // PDF_DOWNLOAD

AWS Kubernetes EKS Chain Attack

Disclosing a multi-stage attack vector involving IAM roles, metadata services, and container breakouts.

PROJECT // BYTEBUZZ

Want to go deeper?


I built ByteBuzz – a platform where you don’t just learn, you build
and break real systems. Master the terminal, cloud, and code in a high-stakes environment.



$ bytebuzz init lab –id=eks-exploit-v1

[+] Provisioning isolated environment…

[+] Deploying vulnerable K8s cluster…

[+] Injecting threat vectors…

$ cd labs/eks-exploit-v1 && ls

manifests/ exploit.py tools/ README.md

_

03 // TRACK_RECORD

Securing the Infrastructure of Today

 

Chen Shiri’s independent research collaborations span Fortune 500 tech firms, security vendors, and governmental organizations globally.

ACCENTURE

George Mason University 

BSides

Hacktivity