Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Live Events

Anti-Cast: API-ocalypse Now with Jennifer Shannon

September 20, 2023 @ 12:00 pm – 1:00 pm EDT Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents “API-ocalypse Now.” In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if…

Social Posts

Blog Posts

Modern Webapp Pentesting: How to Attack a JWT

…way to interpret correctly what is described in the RFC. So if there’s a way to interpret it that’s more secure and a way to interpret that that’s less secure, you can be pretty sure that both of those options exist out there in the world. Somebody has chosen one,…

How to Build a Phishing Engagement: Coding TTP’s

This webcast was originally published on July 9th, 2021. In this video, Ralph discusses how to build a phishing engagement, focusing on coding techniques and tools to automate and secure phishing tests. He demonstrates how infrastructure setup, operational security, and phishing email creation can be automated using tools like Ansible,…

Offense for Defense w/ Tim Medin

…have a family member who has their Netflix hacked giant air quotes, it’s because they use the same crappy password all over the place. And so many, with so many of the other services where it’s hacked and it’s just, oh, I use the same secure password. You’re like, well…

Tales from the Network Threat Hunting Trenches & AI Hunter Demo

Network Threat Hunting & AI Hunter Demo

…we want people to tell us what you want next, and if you want reporting. Yes. we had a lot of conversations about how we want that to go. Chris had some good ideas about integrating with slack. So you can basically give it a slack channel that it can…

Think You’re Compromised? What Do We Do Next?

…And it was amazing. As part of that incident, we should have secured that area first for that type of thing to not happen, but we maybe should have told them to stay away, which we did from that point on. But the point is, we didn’t secure the area,…

Casting Light on the Known Unknowns

…are very insecure. The, the smart people that I’ve come, up and have met in my life, when you ask them a question about why I don’t understand your logic, they go, that’s a great question. And, you mentioned how we can feel a little insecure about asking that question…

Securing the Blobs | A Deep Dive on S3 Security

…consistently talk about, is it, is the secure system that you’re designing performant and is it also resilient and that that comes into the S3 conversation as well when we talk about multi region data replication or potentially what happens when you have like an issue with an availability zone…

Shopping Cart

No products in the cart.