Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
AIMap Demo: Managing AI Exposure at Scale
Linux Kernel Exploit, GitHub RCE, and Canvas Cyberattack
The Security Reset: A Leadership Guide to Clarity, Control & Real Risk
cPanel Auth Bypass, Claude AI Code Risks, and Trigona Ransomware
Anthropic Tool Access, EU App Bypasses, and Active Zero-Days
AI-Powered Application Penetration Testing Datasheet
Trusted Tools, Hijacked Sessions & Cheap Paths to Big Access
AI Security in the Age of Project Glasswing & GPT-5.4 Cyber
Project Glasswing: AI Vulnerability Discovery & Exploit
GitHub Malware, DNS Hijacking, Ransomware Speed & AI Exploits
How Cosmos AI and Human Expertise Work Together to Strengthen Application Security
Inherited Access, AI Permissions, Supply Chain Attacks & Edge Exposure
Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows
Secure AI-Assisted Development: 15 Guardrails for Shipping AI-Generated Code
Inside Cirro: Schemas and Extensible Identity Graphs
Inside Cirro: Mapping Attack Paths in Azure
Tactics of Deception: Protecting Trust and Purpose
Speed, Trust, and the Compromised Workbench
Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks
Designing for Resilience: LastPass Prioritizes Security in Move to Cloud
AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks
Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure
Autonomous AI, Broken Guardrails, and Geopolitics
2026 GigaOm Radar for Attack Surface Management
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.