Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
AI-Powered Application Penetration Testing Datasheet
Trusted Tools, Hijacked Sessions & Cheap Paths to Big Access
AI Security in the Age of Project Glasswing & GPT-5.4 Cyber
Project Glasswing: AI Vulnerability Discovery & Exploit
GitHub Malware, DNS Hijacking, Ransomware Speed & AI Exploits
How Cosmos AI and Human Expertise Work Together to Strengthen Application Security
Inherited Access, AI Permissions, Supply Chain Attacks & Edge Exposure
Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows
Secure AI-Assisted Development: 15 Guardrails for Shipping AI-Generated Code
Inside Cirro: Schemas and Extensible Identity Graphs
Inside Cirro: Mapping Attack Paths in Azure
Tactics of Deception: Protecting Trust and Purpose
Speed, Trust, and the Compromised Workbench
Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks
Designing for Resilience: LastPass Prioritizes Security in Move to Cloud
AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks
Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure
Autonomous AI, Broken Guardrails, and Geopolitics
2026 GigaOm Radar for Attack Surface Management
The Role of AI in Modernizing Enterprise Application Security
SSO Phishing, Patching Failures, Exposed APIs
Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats
Deepfakes, Spyware Kits, and LLMs for Hire
Building Tools: What, When, and How
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.