Whitepapers
Dec 10, 2022
Selecting The Best Information Security Training
In this free guide, Offensive Security provides 6 essential points to consider when you’re evaluating information security training.
1 min read

How do you select the best Cybersecurity Training Provider?
The shortage of IT staff with cybersecurity skills is a massive challenge for organizations. Investing in training is the best way to nurture in-house talent.
But how do you ensure your investment is the right one?
This free guide from Offensive Security shares:
-
- 6 essential factors to consider when selecting training
- How to evaluate and compare courses
- How to ensure the best return on investment
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read