Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
Product Security Reviews: The Basics Are Still the Breach
The Basics are the Breach: Lessons from Real-World Product Security Reviews
AI & LLM Security Testing Datasheet
Demystifying 5G Security: Understanding the Registration Protocol
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
LLM-Assisted Vulnerability Research
Scaling Application Security: Lessons from Salesforce AppExchange
AI War Stories: Silent Failures, Real Consequences
Red Team Activated: Testing a Global Risk Intelligence Platform
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Red Team Readiness Guide
The Human Element of AI Security Solution Brief
Red Team Readiness Assessment
Breaking AI: Inside the Art of LLM Pen Testing
Sliver Workshop Part 2: Staging & Automation
Red Team & Adversarial Emulation Solution Brief
Architecting Cloud Security Testing in the GenAI Era
Sliver Workshop Part 1: Getting Started & 1.6 Features
Panel: PCI DSS 4.0 Expert Breakdown
Attacking & Defending Deepfakes: A Red Teamer’s Perspective
Attack Surface Management: Measuring Real-World Impact
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.