Top 16 OffSec, pen-testing, and ethical hacking certifications

Top 16 OffSec, pen-testing, and ethical hacking certifications

Red team careers are in high demand, with companies seeking professionals skilled in penetration testing, offensive security (OffSec), and ethical hacking. To stand out in a competitive job market, cybersecurity professionals should consider earning certifications that validate their expertise. Here’s a look at the top certifications for offensive security today, along with advice on how…

Read More
U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question “can hacking be treason?” prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody…

Read More
Google DeepMind Introduces MONA: A Novel Machine Learning Framework to Mitigate Multi-Step Reward Hacking in Reinforcement Learning

Google DeepMind Introduces MONA: A Novel Machine Learning Framework to Mitigate Multi-Step Reward Hacking in Reinforcement Learning

Reinforcement learning (RL) focuses on enabling agents to learn optimal behaviors through reward-based training mechanisms. These methods have empowered systems to tackle increasingly complex tasks, from mastering games to addressing real-world problems. However, as the complexity of these tasks increases, so does the potential for agents to exploit reward systems in unintended ways, creating new…

Read More
The Worst Hacks of 2024

The Worst Hacks of 2024

Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly marked by hacking sprees in which cybercriminals and state-backed espionage groups repeatedly exploited the same weakness or type of target to fuel their frenzy. For attackers, the approach is ruthlessly efficient, but for compromised institutions—and…

Read More