Blog
Home / Blog

Introduction to IoT Security
What is IoT? The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances, and other objects embedded with sensors, software, and

Docker Hardening Best Practices
Docker has gained immense popularity in recent times due to its containerization capabilities. However, as with any widely used platform, there is an increased risk

Attacking Kubernetes (Part 1)
Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

6 ways Data Breaches Can Strike Your Brand Value
Data breaches have become a significant concern for organizations across industries worldwide. With more sensitive data stored and transmitted online, these security breaches have far-reaching

Kerberos Attacks (Part 2)
In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Attacking Kerberos Delegation
Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment. Topics covered: Basic principles

Buffer Overflow Basics
Buffer overflow is a vulnerability where a program tries to store more data in a buffer than it can hold, potentially overwriting important data or

Exploiting MySQL Service
What is MySQL? MySQL is a powerful, free, open-source database management system widely used in web applications. It uses the popular Structured Query Language (SQL)

Android Webview Vulnerabilities
In this blog, we are going to discuss Android WebView vulnerabilities. What is a WebView? The WebView class, which is an extension of the View

Kerberos Attacks- Part 1
As discussed in the Active Directory Basics blog, Kerberos is an authentication mechanism used to authenticate users and services. The two main components of Kerberos

Dependency Confusion Attack and its Mitigation
In this blog, we will discuss Dependency Confusion attacks and ways to exploit them. What is a Dependency Confusion Attack? Dependency confusion is an attack

Seven Common Web App Vulnerabilities
Web applications are essential to our daily lives but pose a significant security risk. Cybercriminals are always looking for ways to exploit vulnerabilities in web