Join us in this new blog post as we explore the various methods that threat actors commonly use to m...
Pwned Labs Blog
The latest techniques in hacking and defending
Join us in this blog post as we explore various methods that threat actors commonly use to gain init...
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lat...
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwne...
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned...
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LO...
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security...
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.