
May 1, 2025
Offensive Security in the age of AI
Think Like a Hacker. Break the LLM.A hands on guide for Red Team leaders to understand, exploit, and simulate the latest AI vulnerabilities. As AI systems like ChatGPT, Gemini, and open-source LLMs integrate into enterprise workflows, they open up new attack surfaces and new responsibilities for red teams. In this exclusive white paper, you’ll discover how OffSec’s Red Teaming LLM Learning Path empowers offensive
Think Like a Hacker. Break the LLM.
A hands on guide for Red Team leaders to understand, exploit, and simulate the latest AI vulnerabilities.
As AI systems like ChatGPT, Gemini, and open-source LLMs integrate into enterprise workflows, they open up new attack surfaces and new responsibilities for red teams. In this exclusive white paper, you’ll discover how OffSec’s Red Teaming LLM Learning Path empowers offensive security leaders to:
- Map and enumerate real world LLM deployments.
- Execute advanced jailbreaks, prompt injections, and supply chain exploits.
- Simulate red team operations that challenge AI enabled defenses.
Download the eBook to future proof your red team against the next generation of adversarial threats.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read

Insights
Recompiling Your “Self”: A Cybersecurity-Inspired Guide to Resilience
A recap of our mental health OffSec LIVE session, with tips on ensuring intentional change, self-awareness, and digital resilience in cybersecurity.
May 28, 2025
8 min read