Get 20% off Learn One with labs, exams, and certifications. Act fast! Discount will be gone in a flash. The post Save 20% on OffSec’s Learn One! appeared first on OffSec. This article has been indexed from OffSec Read the…
Tag: OffSec
From Failure to 100: How Akas Earned His OSCP+
In this guide, we’re sharing an inspiring story from one of our OSCP+ Certified Holders who embodies the journey of Try Harder. We’d like to introduce you to Akas Wisnu Aji (justakazh), a Cyber Security Consultant from Indonesia, who became…
OSCP vs. OSWE: Which Certification Fits Your Career Goals?
OSCP vs OSWE: find out which OffSec certification suits you best! Build pen testing expertise or master advanced web exploit development. The post OSCP vs. OSWE: Which Certification Fits Your Career Goals? appeared first on OffSec. This article has been…
Recent Vulnerabilities in Redis Server’s Lua Scripting Engine
Discover multiple Redis CVEs, including the critical CVE-2025-49844 — a 13-year-old use-after-free vulnerability in the Lua parser that can allow remote code execution and server crashes. The post Recent Vulnerabilities in Redis Server’s Lua Scripting Engine appeared first on OffSec.…
Best Cybersecurity Certifications for Beginners
Discover the best entry-level cybersecurity certifications in 2025. Compare costs, career paths, and earning potential for security certifications from OffSec. The post Best Cybersecurity Certifications for Beginners appeared first on OffSec. This article has been indexed from OffSec Read the…
Red Team Exercise
Learn how red team exercises simulate real cyberattacks to test defenses. Discover benefits, implementation steps, and how to strengthen your security posture. The post Red Team Exercise appeared first on OffSec. This article has been indexed from OffSec Read the…
What Is Ethical Hacking?
Learn what ethical hacking is, how it differs from malicious hacking, and why it’s crucial for cybersecurity. Explore tools, certifications, and career paths. The post What Is Ethical Hacking? appeared first on OffSec. This article has been indexed from OffSec…
How to Prevent Prompt Injection
Discover 5 strategies to prevent prompt injection in LLMs. Protect your AI systems against malicious inputs with expert security strategies from OffSec. The post How to Prevent Prompt Injection appeared first on OffSec. This article has been indexed from OffSec…
Red Teaming vs Pentesting: What’s the Difference?
Discover the differences between red teaming and penetration testing. Learn when to use each approach and how they strengthen your security posture. The post Red Teaming vs Pentesting: What’s the Difference? appeared first on OffSec. This article has been indexed…
5 Signs You’re Ready for a Career in Cybersecurity
Cybersecurity is one of the most exciting and impactful fields in technology. It offers the chance to solve complex problems, protect critical systems, and make a real difference in how the world stays connected and secure. Every day brings new…
9 OSCP Study Tips to Help You Succeed
We’ve gathered some of the best OSCP study tips from the community and compiled them into one place to help prepare you for your upcoming exam! The post 9 OSCP Study Tips to Help You Succeed appeared first on OffSec.…
CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection
Discover how CVE-2025-29891 impacts Apache Camel via CAmelExecCommandArgs header injection. Learn how attackers exploit this misconfiguration for remote code execution and how to secure your systems. The post CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection appeared first on…
Talent Finder: The Smarter Way to Hire and Get Hired
Talent Finder connects certified cybersecurity professionals with companies that value proven skill. It’s a smarter way to hire and get hired. The post Talent Finder: The Smarter Way to Hire and Get Hired appeared first on OffSec. This article has…
Get Noticed: 5 Cybersecurity Job Hunt Tips
If you’ve already set your heart on your chosen career path, you might understand that getting noticed by the right employer isn’t always straightforward. When we speak with OffSec learners, many will say that getting the first job is the…
CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass
Discover CVE-2025-30208, a critical arbitrary file read vulnerability in the Vite development server. Learn how remote attackers exploit @fs URL handling to access sensitive files. The post CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass appeared first…
CVE-2025-27136 – LocalS3 CreateBucketConfiguration Endpoint XXE Injection
Discover how CVE-2025-27136, a critical XXE vulnerability in LocalS3’s CreateBucketConfiguration endpoint, can be exploited to access sensitive files. Learn how the flaw works and how to mitigate it. The post CVE-2025-27136 – LocalS3 CreateBucketConfiguration Endpoint XXE Injection appeared first on…
How OffSec Certifications Help You Hire With Confidence
Hire cyber talent with confidence: OffSec certifications prove candidates can perform under pressure, not just talk the talk. The post How OffSec Certifications Help You Hire With Confidence appeared first on OffSec. This article has been indexed from OffSec Read…
CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
CVE-2024-12029: A critical deserialization vulnerability in InvokeAI’s /api/v2/models/install endpoint allows remote code execution via malicious model files. Exploit risk for AI art servers. The post CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability appeared first on OffSec. This article has…
What is Phishing? Introduction to Phishing Demo (for Beginners)
Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering. The post What is Phishing? Introduction to Phishing Demo (for Beginners) appeared first on OffSec. This…
CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass
Discover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it. The post CVE-2025-27636 – Remote Code Execution in…