Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
What to Expect of Your Nest Security Assessment
What to Expect of Your Google Partner Security Assessment
Developing a New Methodology for Illumio to Measure the Power of Micro-Segmentation
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
Illumio Assessment Report: Interview with Raghu Nandakumara and Rob Ragan
Dufflebag Deep Dive: Uncovering Secrets in Exposed EBS Volumes
DerpCon 2020 - Demystifying Capture The Flags (CTF)s
Ham Hacks: Breaking into the World of Software Defined Radio
.NET Roulette: Exploiting Insecure Deserialization in Telerik UI
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
Ham Hacks: Breaking into the world of software-defined radio
Demystifying Capture the Flags (CTFs)
Salesflare Focuses on Application Security for the G Suite Marketplace
Scaling up Google's Third-Party Security Program
Expose Yourself Without Insecurity: Cloud Breach Patterns
Attacking the Data Before the Decision
How to Write Like It's Your Job
Sonos Makes Secure Moves with Bishop Fox
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Wickr: How Bishop Fox Enables Wickr's Security Assurance
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.