#OffensiveSecurity

2025-05-29

If you’re in #offensivesecurity, you’ve probably had this thought: “Cool ML demo. But would I trust it during an actual engagement?” 👉

We’ve all seen the flood of automation promises - but the real question is:

What would you *realistically* trust Machine Learning to do for your workflow?

2025-05-27

🇬🇧 💥 From payload smuggling to stealthy persistence...
This year, hashtag#leHACK 2025 talks are digging deep:
🕵️‍♂️ Cache me if you can – payloads via browser cache
🎭 The imposter’s guide to Hacking – with live demos
🎯 The Art of Staying In – unconventional backdoors on Windows & Linux

🚀 Explore the full lineup: lehack.org/2025/tracks/confere
🎟️ Don’t sleep on this : billetweb.fr/lehack-2025-the-s

------------

🇫🇷 💥 Du contournement au maintien d’accès furtif…
Cette année, les talks hashtag#leHACK2025 vont droit au système 😉 :
🕵️‍♂️ Cache me if you can – des payloads via le cache navigateur
🎭 The imposter’s guide to Hacking – avec démos en live
🎯 The Art of Staying In – backdoors atypiques sur Windows & Linux

🚀 Découvrez le programme complet : lehack.org/2025/tracks/confere
🎟️ N'oubliez pas vos places : billetweb.fr/lehack-2025-the-s
#Hacking #OffensiveSecurity #leHACK

Overture Rede Private LimitedOvertureRede
2025-05-26

Master real-world attack strategies to defend smarter. Train offensively, protect proactively—with Overture Rede. 🔐💻

🚀 Start your journey with Overture Rede!
📩 resumes@overturerede.zohorecruitmail.in
📱 WhatsApp: +91-9582224661
🔗 Apply: zurl.co/LJ7gD

2025-05-22

Ever wanted to talk directly to the engineers behind Pentest-Tools.com? ↴

Now’s your chance!

At Infosecurity Europe, our offensive security engineers, product minds, and customer success pros will be at stand C152 - ready to answer questions, swap war stories, and show you how we turn scans into proof, fast.

📍 Stand C152 | Infosecurity Europe 2025 | June 3–5 | ExCeL London

Whether you’re automating internal scans, validating critical risks with screenshots and PoCs, or building reports that actually land with leadership - our team can help you do more with the tools you already trust.

👀 See live demos of high-impact workflows
💬 Get 1:1 time with the engineers behind the platform
🎁 Grab exclusive event swag (yes, you’ll actually wear it)
🎓 And don’t miss our hands-on security workshop on June 3rd

We’re not just showing up - we’re showing what reliable, practitioner-built tooling looks like.

👉 Planning to attend?

Drop by stand C152 - or check out the page in the comments to book time with the team.

Get all the details right here 👉 pentest-tools.com/events/infos

#InfosecurityEurope #CyberSecurity #OffensiveSecurity

An image of a red-haired, hoodie-wearing ethical hacker next to a layout highlighting booth C152 where Pentest-Tools.com will be exhibiting at Infosecurity Europe 2025
2025-05-19

Metasploit Basics: Your First Stop in Ethical Exploitation 🚂💻🛡️

The Metasploit Framework is a powerful tool used by ethical hackers and penetration testers to identify and validate security vulnerabilities — all within authorized lab environments.

🧠 What you'll learn as a beginner:
• Launching msfconsole and navigating modules
• Using search, use, and show options commands
• Exploiting known vulnerabilities (e.g., MS08-067) in test environments
• Understanding payloads, listeners, and sessions
• Basics of Meterpreter for post-exploitation testing

🎯 Ideal for cybersecurity learners, OSCP candidates, and red teamers building foundational skills — ethically and safely.

Disclaimer: This content is intended for educational and ethical use only. Use Metasploit only in lab environments or with explicit permission.

#Metasploit #EthicalHacking #CyberSecurity #RedTeamTools #InfoSec #EducationOnly #PenTestReady #OffensiveSecurity #Meterpreter

2025-05-13

Infosec pros, we’re coming in hot!

📍 Stand C152 | Infosecurity Europe 2025 | ExCeL London

Tired of scanners that scream and reports that ramble?

Swing by Pentest-Tools.com at stand C152 and see how we help security teams move from detection to proof - faster, cleaner, and with way less noise.

Stop by for:

👨‍💻 Live demos (no buzzwords).
🎙️ Real talk with our #offensivesecurity
specialists.
🧰 One product. Comprehensive coverage. Zero fluff.
🧢 Swag you’ll actually want to wear.

🔍 Bonus: Join our live security workshop
“Automating Vulnerability Detection & Validation in Your Private Cloud”
📅 Tuesday, June 3 · 12:00–13:30 BST
📍 South Gallery Room 4

Because your time is too valuable to waste on false positives and fragmented tools.

👇 Drop by, challenge us, ask anything.

We'd love to see you at Infosecurity Europe! Get your free ticket to the event: invt.io/1lxbiwj6bpk

#Infosecurityeurope #Cybersecurity #offensivesecurity #VulnerabilityManagement

2025-05-07

Alright, people, WordPress is in the spotlight again, and not for the fun reasons! 🤦‍♂️ The OttoKit plugin (you might remember it as SureTriggers) is currently dealing with a *nasty* security vulnerability – we're talking CVE-2025-27007, slapped with a hefty CVSS score of 9.8! 🤯 This one's all about privilege escalation, which is never good news.

So, first things first: updating to version 1.0.83 isn't just a suggestion; it's pretty much a must-do right now.

Now, let's be real for a sec. Those automated scans? They're handy, a good first look, for sure. But if you *really* want to know what's lurking beneath the surface, nothing beats a thorough pentest. It's the kind of deep dive that uncovers the issues automated tools often miss. My clients? They're always super grateful when I lay out the unvarnished truth of their security posture after a proper test. It just gives them that peace of mind.

So, spill the beans – how are *you* battening down the hatches on your WordPress installs these days? Curious to hear your strategies!

#WordPressSecurity #Pentesting #OffensiveSecurity

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-05-07

🎙️ What happens when you combine the mindset of a red team with the precision of elite cybersecurity strategy? In this On Location Briefing from #RSAC2025, we find out how real-world impact is changing the game.

🚀 New Briefing from #RSAC 2025: From Red Teams to Real Impact — Bringing Artistry and Precision to Cybersecurity Programs

At RSA Conference 2025, Sean Martin, CISSP caught up with Charles Henderson, Executive Vice President of Cyber Security Services at Coalfire, to talk about the evolving role of offensive security — and why artistry, precision, and strategic thinking are becoming essential elements of the most effective cybersecurity programs.

🔐 How can organizations move beyond check-the-box testing to build truly resilient systems?

Find out how Coalfire is helping companies rethink offensive security as a critical driver of real-world cyber resilience and innovation.

🎙️ Watch, listen, or read the full conversation here:
👉 itspmagazine.com/their-stories

📌 Learn more about Coalfire’s work:
👉 itspmagazine.com/directory/coa

🛰️ See all our RSAC 2025 coverage:
👉 itspmagazine.com/rsac25

🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 itspmagazine.com/brand-story

🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!

⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

#cybersecurity #infosec #infosecurity #technology #tech #society #business #offensivesecurity #redteam #cyberresilience #coalfire

2025-05-07

So, AI in the security game? Yeah, it can definitely lend a hand, no doubt.
BUT, let's be crystal clear: automated tools are *not* a replacement for a legit, honest-to-goodness PENTEST.
It's a common trap to think, "Oh, just run a scanner over it, and we're golden."
Spoiler: you're not.
You absolutely need more human smarts and real brainpower poured into it. Otherwise, those super sneaky, really critical vulnerabilities? They’ll just fly right under the radar. You'll never catch 'em.
What's your take on this? Am I off base here?
#Pentesting #AISecurity #OffensiveSecurity

Overture Rede Private LimitedOvertureRede
2025-05-06

Stay ahead of cyber threats with expert-led training in Splunk, Offensive Security, and Threat Modeling. Equip your team to detect, defend, and secure. 🛡️

🚀 Start your journey with Overture Rede!
📩 resumes@overturerede.zohorecruitmail.in
📱 WhatsApp: +91-9582224661
🔗 Apply: zurl.co/eMAwC

2025-05-01

Hey everyone,

Just came across some info on new AI frameworks like MCP and A2A. Gotta say, they sound pretty powerful on the surface, but honestly, it immediately set off some alarm bells for me. 😬

It seems like everyone's hooking LLMs up to *everything* these days, which is cool tech-wise. But my big question is: who's actually watching the security side of things? Coming from a pentesting background, my mind instantly jumps to the risks – stuff like Prompt Injection vulnerabilities, potential Tool Poisoning, and some really nasty data leak scenarios.

So, what's your take on this? Are we looking at a need for much stronger Security by Design principles right from the start, or is it more about seriously boosting awareness across the board? Let me know your thoughts below! 👇

#AISec #Pentest #OffensiveSecurity

2025-04-30

Holy smokes, looks like SentinelOne's in the crosshairs of China-linked hackers! 🤯 A group called PurpleHaze, which seems loosely connected to APT15, is reportedly making moves. Apparently, they're leveraging ORB networks to cover their digital tracks. That's pretty wild stuff!

And get this: it's not just SentinelOne customers feeling the heat – SentinelOne itself has been impacted. On top of that, we're hearing about ransomware gangs actually using EDR-Testing-as-a-Service to test their malicious software. Seriously, WTF?! 🤦

So, here's my two cents: Automated scans? Sure, they're nice to have around. But real-deal Threat Intel? That's still king. Plus, you absolutely *cannot* underestimate the value of thorough, manual penetration tests. It really drives home the point: security isn't just a product you install; it's a constant process you've gotta manage.

What do you all think? How are you keeping your own infrastructure locked down these days? 🤔

#Cybersecurity #ThreatIntel #Pentest #APT #offensiveSecurity

Straikerstraikerai
2025-04-28

Welcome new guardian, Dan Regalado, to
@straikerai
🚀💥 He is a Principal AI Security Researcher and will lead offensive AI security research as part of Straiker AI Research (STAR) Team.

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-04-25

🎙️✨ Here is a new Brand Story!

Guest: John Stigerwalt & Gregory Hatcher
Episode Title: No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs

🚀 Marco Ciappelli and Sean Martin, CISSP are back — and this time, they’re chatting with the founders of White Knight Labsfor their first Brand Story with ITSPmagazine!

From learning on the field to building red teams to one of the toughest certification programs — John and Greg aren’t just playing the cybersecurity game. They’re rewriting it.

They don’t believe in cookie-cutter pen tests.
They simulate real ransomware attacks.
They write their own loaders.
And they only resell products they’ve personally tested in the wild.

🔥 Passion.
🔍 Precision.
🤝 Purpose.

🎧 Listen or watch now — and meet the team that’s raising the bar for offensive security:
📺 Video Teaser: youtu.be/VdGyPFhLAvU
👉 Full Podcast: brand-stories-podcast.simpleca

📌 Learn more about White Knight Labs on their Brand Page on ITSPmagazine:
itspmagazine.com/directory/whi

🎉 Join us in welcoming White Knight Labs to the ITSPmagazine family!
We already have three more conversations scheduled with them — you won’t want to miss what’s coming next.

Be sure to follow White Knight Labs and the Brand Stories with Sean and Marco podcast to stay connected with this exciting journey.

brand-stories-podcast.simpleca

#penetrationtesting #redteam #ransomwaresimulation #offensivesecurity #edrbypass #cybersecuritytraining #whiteknightlabs #apt #cybersecurityservices #defcon #ransomware #pentesting #redteam #hacking #securitypartnerships #infosec #infosecurity

2025-04-20

Offensive techniques training

Interested in getting hands-on experience with dynamically updated labs in AWS, Cobalt Strike, and custom payload development strategies? That course is for you!

Learn more: nsec.io/training/2025-offensiv

#infosec #redteam #offensivesecurity #training #devops

Banner of our training Offensive Development Practitioner Course.
2025-04-14

Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. recon.cx #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @SinSinology @hunterbr72 @clearbluejar @phLaul @oryair1999 @hookgab @TheQueenofELF @So11Deo6loria @i0n1c @pedrib1337 @MalachiJonesPhD @Pat_Ventuzelo @KB_Intel @pinkflawd @Reverse_Tactics @OnlyTheDuck @t0nvi @drch40s @BrunoPujos @mhoste1 @andreyknvl @texplained_RE @jsmnsr @pulsoid @SpecterDev @richinseattle @yarden_shafir @aionescu @hackerschoice @SinSinology @sergeybratus @SpecterOps @oryair1999 @phLaul @trailofbits @HexRaysSA @nostarch

Alameen KarimMerali :verified:brotheralameen@ioc.exchange
2025-04-04

learnfly.com/posts/course_deta

#New #Cybersecurity #Course on #Hardening #Windows and #Linux #Systems #Published.

This course can be used as a #refresher or can be used for those new to cybersecurity and are willing to learn. If you’re interested, please check through the link above and purchase if required.

Thanks.

#CyberSecurity #PhysicalSecurity #OperationalSecurity #OpSec #CyberSec #InformationSecurity #InfoSec #OffensiveSecurity #OffSec #EthicalHacking #CEH

Chema Alonso :verified:chemaalonso@ioc.exchange
2025-03-24

El lado del mal - Offensive Security: Máster Online en Seguridad Ofensiva del Campus Internacional de Seguridad 2025/2026 (última oportunidad) elladodelmal.com/2025/03/offen #Ciberseguridad #RedTeam #Pentest #Pentesting #Pentester #Master #Formación #OffensiveSecurity

2025-03-22

Calling all Monterrey, N.L.-based Pen Testers and Red Teamers!

We need 3 junior and 1 senior consultants:

👉 Penetration Testers (2 Junior, 1 Senior) - Hybrid in Monterrey, N.L., Mexico with salary of $40,000 to $80,000 MEX pesos per month
careers-page.com/nearshore-cyb

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst