Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

5 Quick Wins to Ace Your Next Penetration Test
A penetration test, often referred to as a “pen test,” is a simulated cyber-attack against your computer system to check for exploitable vulnerabilities. Businesses today

What is Purple Teaming?
Purple teaming is an approach to cybersecurity that leverages both red and blue teams’ strengths for maximum benefit to improve an organization’s overall security posture.

Choosing the Best Penetration Testing Services
Pentesting, also known as penetration testing, simulates cyber attacks to identify any vulnerabilities before malicious actors exploit them. This proactive approach is crucial for enhancing

Red Team vs Blue Team Key Differences
These days, cyber attacks seem to be increasing at a high rate; therefore, organizations need to be concerned about securing their details and information from

Penetration Testing Vs Red Teaming
It is evident that with the advancement of technology, the risks associated with it have also increased. Cybercriminals are always on the lookout for new

Azure Privilege Escalation Via Service Principal
In this blog, we will look at a variation of a real-world attack path to escalate our privileges from a compromised Application Administrator account in

Introduction to IoT Security
What is IoT? The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances, and other objects embedded with sensors, software, and

Docker Hardening Best Practices
Docker has gained immense popularity in recent times due to its containerization capabilities. However, as with any widely used platform, there is an increased risk
Attacking Kubernetes (Part 1)
Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Kerberos Attacks (Part 2)
In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Attacking Kerberos Delegation
Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment. Topics covered: Basic principles

Buffer Overflow Basics
Buffer overflow is a vulnerability where a program tries to store more data in a buffer than it can hold, potentially overwriting important data or