CloudGoat walkthrough series: Lambda Privilege Escalation

This is the third in our walkthrough series of CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security Labs. It is used to deploy…

What are smart contracts?

What are Smart Contracts Let’s understand what Smart Contracts are using a simple example. Consider the purchase of cookies from a vending machine. The one who wants to buy the…

Introduction to blockchain consensus algorithms

What is Blockchain A blockchain is a record of digital transactions. It is a distributed software network which can function both as a digital ledger and as a mechanism allowing…

OffSec 2020 Recap

2020 has been quite a year, hasn’t it? It’s been challenging in so many ways, but it was also exciting for us at OffSec. We thrive on bringing new training…

OffSec 2020 Recap

2020 has been quite a year, hasn’t it? It’s been challenging in so many ways, but it was also exciting for us at OffSec. We thrive on bringing new training…

Generating Text Using ML

Most of us have that one TV show that we want to see just one more episode of. Just one more reunion or reboot or movie to finish off a…

Setting up a virtual lab for cybersecurity data science

“Giant Rabbit uses Carrot Smash. You take 9999 damage. Game over.”  “Aww! All right, this time I’ll get it for sure.”  “Do you want to reload your last save?”  “YES.” …

Information security strategy for the hybrid and multi-cloud

Cloud computing is omnipresent, and most organizations are opting for a model that combines several types of cloud infrastructure: private and public cloud (known as hybrid cloud) or public clouds…

CloudGoat walkthrough series: Cloud Breach S3

This is the second in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security Labs. It is used to…

Vulnerability Assessment: 6 Best Steps to Better Security