Penetration Testing Vs. Red Teaming: Key Differences

It is evident that with the advancement of technology, the risks associated with it have also increased. Cybercriminals are always on the lookout for new ways by which they can exploit the system and gain unauthorized access to sensitive data. Penetration testing and red teaming come into play here. Both techniques identify vulnerabilities in a...

Azure Privilege Escalation Via Service Principal

In this blog, we will look at a variation of a real-world attack path to escalate our privileges from a compromised Application Administrator account in Azure to Global admin through a service principal. Before diving into the attack’s details, let us understand some Azure basics to help us further down the path. What is Azure?...

Introduction to IoT Security

What is IoT? The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances, and other objects embedded with sensors, software, and connectivity. It allows them to exchange data and interact over the Internet. Therefore, the basic idea of IoT is to connect all these devices to the Internet, enabling them to...

Attacking Kubernetes – Part 1 

Kubernetes 101  Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in a distributed system environment. Google initially developed it, and is now maintained by the Cloud Native Computing Foundation (CNCF).  In the context of Kubernetes clusters, containers are arranged in collections...

Docker Hardening Best Practices

Docker has gained immense popularity in recent times due to its containerization capabilities. However, as with any widely used platform, there is an increased risk of security threats. Therefore, taking the necessary measures to secure your Docker environment is imperative. In this regard, here are some Docker hardening best practices you should consider implementing. Run...