Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties

TJ Null Community Manager A few months ago, Microsoft released an article that stated that a change would be implemented on Microsoft Office Applications that utilize Macros. Reference: https://docs.microsoft.com/en-us/deployoffice/security/internet-macros-blocked  This…

The ever-evolving role of the CISO: Cybersecurity leadership skills needed in the future of work

Heather Monthie, PhD Head of Cybersecurity Training & Education Over the past few years, cybersecurity leaders have seen their roles evolve and expand in scope. With the continued growth of…

Offensive Security Welcomes Cybersecurity Bills Signed into Law

Offensive Security Content Team On Tuesday, June 21, 2022, the White House announced that President Biden signed two crucial cybersecurity bills into law that will strengthen the federal government’s cyber…

How Pulsar Security Established their Continuous Cyber Workforce Development

Offensive Security Cybersecurity Training Case Study Pulsar Security is a team of cybersecurity veterans who primarily focus on offensive security services, and custom red team engagements. The constant influx of…

Offensive Security Hails Passage of Several Cybersecurity Bills in Congress

Offensive Security Hails Passage of Several Cybersecurity Bills in Congress June 16th, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } .entry-content h4 { padding-bottom: 10px; font-weight: 600…

Helping Educational Institutions Align to NCAE-C

Offensive Security Helps Educational Institutions Align to the National Center of Academic Excellence (NCAE-C) Requirements June 16th, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } .entry-content h4…

Celebrate the Release of Our 100th PG-Practice Machine

Celebrate the Release of Our 100th PG-Practice Machine June 9th, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } .entry-content h4 { padding-bottom: 10px; font-weight: 600 !important; }…

OffSec Live

OffSec Live June 8th, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } .entry-content h4 { padding-bottom: 10px; font-weight: 600 !important; } .article-header { display: none !important; }…

3 Ways to Attract Top Cybersecurity Talent to the Federal Government

3 Ways to Attract Top Cybersecurity Talent to the Federal Government May 31, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } .entry-content h4 { padding-bottom: 10px; font-weight:…

Join Our #BetheResource Challenge

Join Our #BetheResource Challenge May 25, 2022     Offensive Security .entry-content h3 { font-weight: bold; padding-bottom: 10px; } Lessons Learned Through Conflict Within our community, we often talk about the latest…