Blog

Home / Blog

A Redfox Cybersecurity blog explaining purple teaming

What is Purple Teaming?

Purple teaming is an approach to cybersecurity that leverages both red and blue teams’ strengths for maximum benefit to improve an organization’s overall security posture.

Read More »
Part one of the blog series on attacking Kubernetes

Attacking Kubernetes (Part 1)

Kubernetes 101 Kubernetes, or K8s, is an open-source container orchestration and management platform. Kubernetes provides a way to manage, deploy, and scale containerized applications in

Read More »
Redfox Cybersecurity blog on attacking Kerberos delegations

Kerberos Attacks (Part 2)

In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and

Read More »
Redfox Cybersecurity blog on attacking Kerberos delegations

Attacking Kerberos Delegation

Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment.  Topics covered:  Basic principles

Read More »