Join us in this blog post as we explore various methods that threat actors commonly use to gain init...
Pwned Labs Blog
The latest techniques in hacking and defending | Cybersecurity news and views
Pwned Labs Blog
The latest techniques in hacking and defending | Cybersecurity news and views
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lat...
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwne...
Many people want to know "how do I get started with AWS security?", and this blog post is for them. ...
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned...
Join us as we get started with using Pacu - an AWS exploitation framework created by Rhino Security ...
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LO...
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security...
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.