Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
The Role of AI in Modernizing Enterprise Application Security
SSO Phishing, Patching Failures, Exposed APIs
Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats
Deepfakes, Spyware Kits, and LLMs for Hire
Building Tools: What, When, and How
Red Team Vendor Evaluation Worksheet
Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk
Application Portfolio Penetration Testing Solution Brief
AI & Security Risks: A Cyber Leadership Panel
Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet
Application Security: Getting More Out of Your Pen Tests
Fortifying Your Applications: A Guide to Penetration Testing
Sliver Workshop Part 3: Building Better Encoders
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
Product Security Reviews: The Basics Are Still the Breach
The Basics are the Breach: Lessons from Real-World Product Security Reviews
AI & LLM Security Testing Datasheet
Demystifying 5G Security: Understanding the Registration Protocol
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
LLM-Assisted Vulnerability Research
Scaling Application Security: Lessons from Salesforce AppExchange
AI War Stories: Silent Failures, Real Consequences
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.