Research & Intelligence

Security Research,
Insights & Advisories

Technical deep-dives, threat intelligence, and industry analysis from the XDepthSense research team. Real findings. No vendor fluff.

Red TeamingMarch 2025

Advanced Active Directory Attacks: Beyond the Basics

A deep-dive into modern Active Directory attack chains that go beyond Kerberoasting — covering ACL abuse, constrained delegation attacks, cross-forest trust exploitation, and RBCD techniques that bypass traditional defences.

Active DirectoryKerberosRed TeamMITRE ATT&CK
Read Article →
Cloud SecurityFebruary 2025

AWS IAM Privilege Escalation: 20 Paths You Might Be Missing

Analysis of twenty distinct IAM privilege escalation vectors observed during real-world cloud assessments in 2024, including novel paths through Lambda execution roles, OIDC federation, and cross-service confusion attacks.

AWSIAMCloud SecurityCSPM
Read Article →
MaritimeJanuary 2025

ECDIS Security: The Navigational System Nobody Is Patching

Electronic Chart Display and Information Systems have become critical navigation infrastructure on modern vessels — yet most run outdated operating systems, accept USB media without scanning, and connect directly to ship management networks. An assessment of the real attack surface.

ECDISMaritimeOTIMO
Read Article →
OT/ICSDecember 2024

ICS Protocol Security: Modbus, DNP3, and IEC 61850 Under Attack

Industrial protocols were designed for reliability, not security. This research documents real attack scenarios against Modbus TCP, DNP3, and IEC 61850-based substations — including packet crafting techniques and the devastating potential of unauthenticated command injection.

ICSSCADAModbusDNP3
Read Article →
Red TeamingNovember 2024

Physical Penetration Testing: A Practitioner’s Field Guide

Physical security testing is often overlooked in favour of digital assessments — but a tailgating attempt or USB drop can bypass million-dollar security stacks. This guide covers reconnaissance, bypass techniques, and reporting for physical engagements.

Physical SecurityRed TeamSocial Engineering
Read Article →
Cloud SecurityOctober 2024

Serverless Security: Attacking and Defending Lambda Functions

Lambda functions are deceptively complex attack surfaces. This research covers event injection, execution role abuse, layer supply chain attacks, and the emerging threat of cross-function data leakage through shared execution environments.

ServerlessLambdaAWSFunction Security
Read Article →

Want Research-Led Security?

Our team actively researches threats so your security posture stays ahead of the curve. Work with practitioners who do the research, not just read about it.