Lateral Movement: A Guide to Multi-Hop Pivoting with Ligolo-ng
Modern networks are no longer flat or openly exposed. Sensitive systems are hidden deep behind layers of segmentation, making direct access nearly […]
Deploying DOTL: Turning Deception into Detection | Part-1
Deploying DOTL: Turning Deception into Detection | Part-1 Introduction: From Concept to Implementation In our first blog, we talked about how attackers […]
Outsmarting LOTL Attacks with DOTL: A Smarter Approach to Cyber Defense
Outsmarting LOTL Attacks with DOTL: A Smarter Approach to Cyber Defense Introduction Earlier cyberattacks mostly relied on external malware, custom-built tools or […]
Uncovering APT Strategies for Cloud Initial Access
Uncovering APT Strategies for Cloud Initial Access OVERVIEW As enterprises increasingly adopt hybrid or multi-cloud environments, adversaries have begun targeting these infrastructures […]
Breaking Jenkins to Build It Better: A Beginnerβs Guide to Jenkins Security Fundamentals
Breaking Jenkins to Build It Better: A Beginnerβs Guide to Jenkins Security Fundamentals So, youβve heard a little about CI/CD pipelines and […]
Cloud Chaos to Cloud Control: Locking Down Terraform Deployments
Cloud Chaos to Cloud Control: Locking Down Terraform Deployments Terraform has emerged as the de facto standard for Infrastructure as Code (IaC), […]
Never let your Kube(let) down
Never let your Kube(let) down OVERVIEW Kubernetes a.k.a K8s is one of the most widely used container orchestration platforms. At its core, […]
Server less Siege: Defend, Detect, Defeat
Server less Siege: Defend, Detect, Defeat Serverless computing creates new security challenges while revolutionizing cloud applications. Through practical examples, defenses, and real-world […]
Securing Cross-Account Access in AWS Organizations: Monitoring and Governance
Securing Cross-Account Access in AWS Organizations: Monitoring and Governance With the growth of organisations, managing multiple AWS accounts becomes crucial for simplifying […]
Breaking Free: Docker, Development, and Breakout
Breaking Free: Docker, Development, and Breakout OVERVIEW Containers have been used for more than two decades now with Docker being one of […]
Enumerating AWS IAM Identity Center
Enumerating AWS IAM Identity Center Identity Center AWS IAM Identity Center (formerly known as AWS Single Sign-On) is a cloud service that […]
Cloud Sleuthing: Decoding AWS Infrastructure
Cloud Sleuthing: Decoding AWS Infrastructure OVERVIEW AWS a.k.a Amazon Web Services is one of the oldest and most widely used cloud service […]