Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Workshop Series: Inside Cirro
Tactics of Deception: Protecting Trust and Purpose
Speed, Trust, and the Compromised Workbench
Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks
Designing for Resilience: LastPass Prioritizes Security in Move to Cloud
AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks
Securing Airline Commerce: Penetration Testing for AWS Cloud Infrastructure
Autonomous AI, Broken Guardrails, and Geopolitics
2026 GigaOm Radar for Attack Surface Management
The Role of AI in Modernizing Enterprise Application Security
SSO Phishing, Patching Failures, Exposed APIs
Fueling Security: How a Fortune 500 Utility Stays Ahead of Emerging Threats
Deepfakes, Spyware Kits, and LLMs for Hire
Building Tools: What, When, and How
Red Team Vendor Evaluation Worksheet
Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk
Application Portfolio Penetration Testing Solution Brief
AI & Security Risks: A Cyber Leadership Panel
Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet
Application Security: Getting More Out of Your Pen Tests
Fortifying Your Applications: A Guide to Penetration Testing
Sliver Workshop Part 3: Building Better Encoders
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.