Spin up purposefully vulnerable Azure AD tenants, detailed examples of modern detection pipelines, new subscriber milestone!
How to secure product features that leverage AI, CISA's repo of example penetration testing findings, how to join Google's red team and other career resources
A Practitioner’s Guide to Consuming AI
CISA/NSA's guide on defending cloud CI/CD, backdooring NPM modules depending on binaries in S3, I'm collecting AI + cybersecurity resources
An overview of current applications of AI/ML to cybersecurity with relevant links and a vision of where things are headed.
In this talk, Louis covers 3 web cache related attacks: cache deception, edge side includes, and cache poisoning.
Interview questions across a variety of roles, several secret scanning tools, an autonomous pentesting tool using GPT-4
An offense-focused approach to AWS pentests, companies ended by cybersecurity breaches, OSS security tools leveraging LLMs
Massive list of purple teaming resources, two new cloud CTFs to practice on, how effective are LLMs at doing secure code reviews?
How to deliver security at scale, the security properties of IMDSv2, a summary of many threat modeling approaches.