Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Red Team Vendor Evaluation Worksheet
Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk
Application Portfolio Penetration Testing Solution Brief
AI & Security Risks: A Cyber Leadership Panel
Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet
Application Security: Getting More Out of Your Pen Tests
Fortifying Your Applications: A Guide to Penetration Testing
Sliver Workshop Part 3: Building Better Encoders
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
Product Security Reviews: The Basics Are Still the Breach
The Basics are the Breach: Lessons from Real-World Product Security Reviews
AI & LLM Security Testing Datasheet
Demystifying 5G Security: Understanding the Registration Protocol
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
LLM-Assisted Vulnerability Research
Scaling Application Security: Lessons from Salesforce AppExchange
AI War Stories: Silent Failures, Real Consequences
Red Team Activated: Testing a Global Risk Intelligence Platform
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Red Team Readiness Guide
The Human Element of AI Security Solution Brief
Red Team Readiness Assessment
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.