
Diving into the World of Adversary Simulation with CRTA
Diving into the World of Adversary Simulation with Certified Red Team Analyst The Red Team Analyst [CRTA] course is designed to train […]

Proactive approach for Securing S3 Buckets
Proactive approach for Securing S3 Buckets OVERVIEW Among all AWS services, S3 is the most targeted by attacks due to its availability […]

Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1 In today’s digital age, organisations and individuals increasingly rely on cloud […]

Investigating Domain Fronting-Based Attacks and Cutting-Edge Detection Strategies
Investigating Domain Fronting-Based Attacks and Cutting-Edge Detection Strategies In-recent trends adversaries are increasingly targeting on-premise/cloud infrastructure, including critical servers and systems within […]

Unmasking the XZ Utils Vulnerability : CVE-2024-3094
Unmasking the XZ Utils Vulnerability :CVE-2024-3094 Evolution of Supply Chain Attack In recent trends, exploiting the supply chain has developed tremendously, as […]

RedCloud OS: A Comprehensive Overview
RedCloud OS: A Comprehensive Overview RedCloud OS, the latest innovation by CW Labs Pvt. Ltd., is a Debian-derived operating system designed for […]

Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations
Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations OVERVIEW As we are aware that the evolution […]

Exploring Ticket Injection in Rubeus
Exploring Ticket Injection in Rubeus When it comes to the AD related operations two famous tools that I can’t possibly overlook are […]

The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket
The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket INTRODUCTION TO QR CODES […]

A Comprehensive Learning Journey Through the Art of Effective Purple Teaming
A Comprehensive Learning Journey Through the Art of Effective Purple Teaming Overview As we are aware that the Purple teaming is a […]

A Unified Purple Teaming Approach on WINRM investigation and detection
A Unified Purple Teaming Approach on WINRM Investigation and Detection OVERVIEW In this blog we will be discussing the unified Purple Teaming […]

The Final Curtain for Process Doppelganging: Unmasking the Defender
The Final Curtain for Process Doppelganging: Unmasking the Defender Introduction Note: This blog does not delve deeply into this technique. However, if […]