Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Building Tools: What, When, and How
Red Team Vendor Evaluation Worksheet
Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk
Application Portfolio Penetration Testing Solution Brief
AI & Security Risks: A Cyber Leadership Panel
Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet
Application Security: Getting More Out of Your Pen Tests
Fortifying Your Applications: A Guide to Penetration Testing
Sliver Workshop Part 3: Building Better Encoders
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
Product Security Reviews: The Basics Are Still the Breach
The Basics are the Breach: Lessons from Real-World Product Security Reviews
AI & LLM Security Testing Datasheet
Demystifying 5G Security: Understanding the Registration Protocol
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
LLM-Assisted Vulnerability Research
Scaling Application Security: Lessons from Salesforce AppExchange
AI War Stories: Silent Failures, Real Consequences
Red Team Activated: Testing a Global Risk Intelligence Platform
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Red Team Readiness Guide
The Human Element of AI Security Solution Brief
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.