
Aug 13, 2019
BlackHat 2019 Recap
BlackHat has always been one of our favorite industry conferences. Although OffSec has been providing educational workshops for years at BlackHat, this was our first year holding an official booth. The booth was a major hit, as we had the opportunity to chat with long-time Offensive Security alumni and also meet some new faces…Did you attend one our BlackHat workshops or stop by the OffSec booth? If so, we’d love to hear about your experience and any feedback you might have — tag us on Twitter @OffSecTraining!
Making connections
BlackHat has always been one of our favorite industry conferences. Although OffSec has been providing educational training for years at BlackHat, this was our first year holding an official booth. The booth was a major hit, as we had the opportunity to chat with long-time Offensive Security alumni and also meet some new faces.
Ning Wang, the CEO of Offensive Security, was also interviewed by Security Guy TV onsite at BlackHat. She spoke on OffSec’s unique training methodology, the mindset of a hacker, and the future of cyber threats. It’s full of interesting nuggets. You can watch it here:
Training
As we’ve done every year at BlackHat, we held several completely sold out, live training classes for several of our courses:
- Advanced Web Attacks and Exploitation (AWAE)
- Penetration Testing with Kali Linux (PWK — which offers the infamous OSCP certification)
- Advanced Windows Exploitation
If you missed out on any of the live training classes, don’t fret — you can still learn more and sign up for our online trainings here. Pursue an Offensive Security certification at your own pace, on your own time.
Did you attend BlackHat 2019?
Did you attend one our BlackHat trainings or stop by the OffSec booth? If so, we’d love to hear about your experience and any feedback you might have — tag us on Twitter @OffSecTraining!
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence
Critical RCE vulnerability (CVE-2024-21683) in Atlassian Confluence Data Center and Server (v5.2–8.9.0) allows authenticated users to execute arbitrary code via malicious code macros.
Jun 12, 2025
2 min read

Research & Tutorials
CVE‑2025‑49113 – Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization
A critical RCE vulnerability (CVSS 9.9) in Roundcube Webmail (
Jun 12, 2025
3 min read

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read