Blog
Sep 4, 2018
A New Partnership
It’s been a busy few months for us here, and for good reason. Today we are proud to announce our new partners at Offensive Security – Spectrum Equity.
2 min read

It’s been a busy few months for us here, and for good reason. Today we are proud to announce our new partners, Spectrum Equity.
Since our inception in 2007, we’ve always had a unique vision regarding what effective learning looks like. We swam against the stream and executed that vision with tenacity. More than a decade later, we find ourselves helping to shape the future of an industry, setting many standards along the way. Over this time, we have pioneered new approaches to online learning, which has resulted in a highly respected brand for training and certification.
Our growth over the years has also brought on operational challenges that require professional and experienced handling, which we have found in Spectrum Equity. With the resources and expertise gained through this partnership, we’re already looking at an extremely exciting roadmap, including many long-awaited gems… *cough*
Not much will be changing on our side. We will keep doing what we do, the same way we’ve been doing it up to now. The main differences will mostly be seen in our ability to execute new, exciting plans and ideas, and have them come to fruition much sooner. We will also take this golden opportunity to mention that we will continue to fully and unequivocally support, develop, and maintain the free, open source platform – Kali Linux. This has been our motivation from day one and is one of our core tenets. We are truly excited about the opportunities around this new partnership and are looking forward to an eventful future. Stay tuned for some additional news as our roadmap gets unveiled.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read