Exploring the World of Hardware Hacking with Matt Brown
In this episode, Phillip Wylie interviews Matt Brown, a hardware hacker and content creator, discussing his journey in ...
On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step ...
Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what ...
We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by ...
The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...
On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...
Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...
Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...
View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...
In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...
In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...
In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...
In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...
In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...
Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...
On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...
Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...
Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...
How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...
In this episode, Phillip Wylie interviews Matt Brown, a hardware hacker and content creator, discussing his journey in ...
In this episode of Simply Offensive, Phillip Wylie interviews Dahvid Schloss, a cybersecurity expert and the emulated ...
In this episode of Simply Offensive, Phillip Wylie and Suzu Labs CEO Mike Bell dive into the intersection of AI and ...
In this episode of Simply Offensive, Phillip Wylie sits down with Len Noe (HaCkEr_213) — the world’s first recognized ...
In this episode of Simply Offensive, Phillip Wylie interviews Shubham Khichi, an offensive security professional and ...
In this episode of Simply Offensive, Phillip Wylie interviews Daniel Lowrie, who shares his extensive background in IT ...
In this episode of Simply Offensive, Phillip Wylie interviews Mike Holcomb, an expert in Operational Technology (OT) ...
In this episode of Simply Offensive, Phillip Wylie interviews Danny Jenkins, CEO and founder of ThreatLocker. Danny ...
In this episode of Simply Offensive, Phillip Wylie is joined by Greg Hatcher and John Stigerwalt from White Knight ...
In this episode of Simply Offensive, Phillip Wylie is joined by Jacob Krell, a cybersecurity professional with a wealth ...
In this episode of Simply Offensive, Phillip Wylie is joined by Corey LeBleu, a cybersecurity professional with over 20 ...
In this episode, Darius Houle joins the conversation to explore the real-world limitations of AI in problem-solving and ...
In this episode, Phillip Wylie and Jacob Krell discuss the integration of AI in Capture The Flag (CTF) competitions and ...
In this episode of Simply Offensive, Phillip Wylie interviews Dan DeCloss, founder of PlexTrack, discussing the ...
In this episode, Phillip Wylie interviews cybersecurity expert Josh Mason about his journey from military service to ...
WHITEPAPER
This White Paper details how agentic AI is drastically accelerating competitive hacking, with CTF "first blood" times on Hack The Box declining by 16% annually. It argues that hacking competitions are shifting from tests of manual human skill to benchmarks for autonomous AI systems. To preserve the industry's integrity, the author suggests adopting a chess-like model with separate tracks for human and AI-augmented performance.
This White Paper details how agentic AI is drastically accelerating competitive hacking, with CTF "first blood" times on Hack The Box declining by 16% annually. It argues that hacking competitions are shifting from tests of manual human skill to benchmarks for autonomous AI systems. To preserve the industry's integrity, the author suggests adopting a chess-like model with separate tracks for human and AI-augmented performance.