Skip to content

Red Teaming

What is Continuous Automated Red Teaming (CART)?

Table of Contents What is Continuous Automated Red Teaming (CART)? How Does Continuous Automated Red Teaming Work? Challenges with Traditional Red Teaming The Evolution to Continuous Automated Red Teaming Benefits of Continuous Automated Red Teaming Continuous Automated Red Teaming vs. Penetration Testing Why CART Matters in Modern Cybersecurity Implementing CART in Your Organization Conclusion: The… Read More »What is Continuous Automated Red Teaming (CART)?

What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

Table of Contents Overview of SEBI Guidelines on Red Teaming Definition of Red Teaming Exercises Reporting Cybersecurity Incidents Incident Response Management Plan Cyber Crisis Management Plan (CCMP) Role of Security Operations Centers (SOCs) Compliance Timeline for Regulated Entities Preparing for SEBI Compliance Conclusion Overview of SEBI Guidelines on Red Teaming The Securities and Exchange Board… Read More »What are the SEBI guidelines on Red Teaming & Continuous Automated Red Teaming (CART)?

The Art of Keytab Files

A keytab file is a file containing pairs of Kerberos principals and encrypted keys. These files are used to authenticate a principal on a network. Kerberos is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Brief Overview of Keytab Files… Read More »The Art of Keytab Files

How do attackers utilize .git

How Do Attackers Utilize .git For Fun And Profit?

Security teams are busy fixing CVEs, SQLi, and other critical vulnerabilities. However, exposing .git can potentially leak credentials, source code and other sensitive information. In this blog, we will uncover the dangers of hidden exposed .git, and how to identify and mitigate the relevant risk. Introduction In the realm of software development, Git stands as… Read More »How Do Attackers Utilize .git For Fun And Profit?