CoreSecurity's profile picture. Providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence.

Core Security

@CoreSecurity

Providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence.

Core Impact รีโพสต์แล้ว

Go beyond superficial usage of #LLMs and #AI in this free training from Cobalt Strike and Outflank experts. Gain practical experience to architect AI-powered attack chains and navigate AI assisted adversary simulation. Register now! ow.ly/V5sC50X73i2

_CobaltStrike's tweet image. Go beyond superficial usage of #LLMs and #AI in this free training from Cobalt Strike and Outflank experts. Gain practical experience to architect AI-powered attack chains and navigate AI assisted adversary simulation.  Register now!
ow.ly/V5sC50X73i2

Core Impact รีโพสต์แล้ว

Ready to tip our hats at @WWHackinFest! Be sure to stop by the Fortra booth to talk about recent updates to our OST toolset , discuss our latest research, and ask any #offsec questions! #WWHF

OutflankNL's tweet image. Ready to tip our hats at @WWHackinFest! Be sure to stop by the Fortra booth to talk about recent updates to our OST toolset , discuss our latest research, and ask any #offsec questions! #WWHF

Core Impact รีโพสต์แล้ว

We're loading up our wagon for this year's @WWHackinFest -- hope to see you all there! This year's theme of "The Future is ******" had us thinking, but we're pretty sure we know what those asterisks stand for. #wwhf

_CobaltStrike's tweet image. We're loading up our wagon for this year's @WWHackinFest  -- hope to see you all there! This year's theme of "The Future is ******" had us thinking, but we're pretty sure we know what those asterisks stand for. #wwhf

Headed to Toronto for Sector? Be sure to join @c3c from @outflankNL to learn how to execute code without relying on traditional files by leveraging file formats and interpreters less likely to trigger security alarms. @blackhatevents #sectorca

_CoreImpact's tweet image. Headed to Toronto for Sector? Be sure to join @c3c from @outflankNL to learn how to execute code without relying on traditional files by leveraging file formats and interpreters less likely to trigger security alarms. 

@blackhatevents #sectorca

Core Impact รีโพสต์แล้ว

Curious about Cobalt Strike? Well sharpen your digital pencils, as class is now in session with a brand new training course created by experts from Cobalt Strike and @_RastaMouse from @_ZeroPointSec, complete with guided labs! ow.ly/e5og50X1GP0

_CobaltStrike's tweet image. Curious about Cobalt Strike? Well sharpen your digital pencils, as class is now in session with a brand new training course created by experts from Cobalt Strike and @_RastaMouse from @_ZeroPointSec, complete with guided labs! 
ow.ly/e5og50X1GP0

Not everyone understands just how vital OffSec is to reducing the frequency and cost of security incidents, but our new guide helps you build a business case and get buy-in for off sec investments. ow.ly/79RS50WVuYC #OffSec #CISO #Cybersecurity

_CoreImpact's tweet image. Not everyone understands just how vital OffSec is to reducing the frequency and cost of security incidents, but our new guide helps you build a business case and get buy-in for off sec investments.  ow.ly/79RS50WVuYC  

#OffSec #CISO #Cybersecurity

Headed to @44CON?Be sure to stop by our booth and join talks from experts @0xTriboulet from @_CobaltStrike and @kyleavery_ from @OutflankNL! Check out the full schedule for more details: ow.ly/lvJz50WVmGX

_CoreImpact's tweet image. Headed to @44CON?Be sure to stop by our booth and join talks from experts @0xTriboulet from @_CobaltStrike and @kyleavery_ from @OutflankNL!  Check out the full schedule for more details:   ow.ly/lvJz50WVmGX

Building on @hacks_zach 's work on CVE-2024-1403, Fortra's expert exploit writer, Marcos Accossatto, demonstrates how to achieve achieve Remote Code Execution using CVE-2025-7388. Read more in his detailed blog: ow.ly/xCaJ50WRtkC

_CoreImpact's tweet image. Building on @hacks_zach 's work on CVE-2024-1403, Fortra's expert exploit writer, Marcos Accossatto, demonstrates how to achieve achieve Remote Code Execution using CVE-2025-7388. Read more in his detailed blog: ow.ly/xCaJ50WRtkC

TOMORROW: The experts at Cobalt Strike are nearly done formulating their next release! Are you ready to see an exclusive preview? See what they’ve been brewing at the live demo tomorrow, August 27th at 9:00am CST! Register now: ow.ly/FQkV50WM8p7

_CoreImpact's tweet image. TOMORROW: The experts at Cobalt Strike are nearly done formulating their next release! Are you ready to see an exclusive preview? See what they’ve been brewing at the live demo tomorrow, August 27th at 9:00am CST!  Register now:
ow.ly/FQkV50WM8p7

In 2025 alone, our expert #exploit writers have added 30 new exploits to the Core Impact library, ensuring users can safely run effective pen tests. Get details on recently released exploits: ow.ly/HFZ450WLwXz


God Morgen from #Sikkerhetsfestivalen! We know you've got a packed agenda, but don't forget to stop by Booth E12 to speak with us about all things #Offsec!

_CoreImpact's tweet image. God Morgen from #Sikkerhetsfestivalen! We know you've got a packed agenda, but don't forget to stop by Booth E12 to speak with us about all things #Offsec!

Breached patient records surged 64.1% since last year, prompting a proposed HIPAA Security Rule update to mandate yearly penetration testing. Our new blog breaks down the important details and what you can do to protect ePHI. ow.ly/ovh250WJHGO

_CoreImpact's tweet image. Breached patient records surged 64.1% since last year, prompting a proposed HIPAA Security Rule update to mandate yearly penetration testing. Our new blog breaks down the important details and what you can do to protect ePHI. 
ow.ly/ovh250WJHGO

Core Impact รีโพสต์แล้ว

Today 13:30 at the Fortra booth (#4422). I am talking about modern automation and LLM/MCP for Cobalt Strike 4.12

Just packed my 🧳for #BHUSA. Besides attending talks and hanging out there, doing a mini-talk at the Fortra Booth. I’ll show we hook LLM/AI into Cobalt Strike (CS 4.12 preview🫣); besides this lots of other content from @OutflankNL and @_CobaltStrike at Booth #4422

ptrpieter's tweet image. Just packed my 🧳for #BHUSA. Besides attending talks and hanging out there, doing a mini-talk at the Fortra Booth. I’ll show we hook LLM/AI into Cobalt Strike (CS 4.12 preview🫣); besides this lots of other  content from @OutflankNL and @_CobaltStrike at Booth #4422


Core Impact รีโพสต์แล้ว

Our research team is live at Black Hat USA! We’re hosting a series of 15-minute lightning talks packed with technical insights! Swing by Booth #4422 to catch these bite-sized sessions from the Outflank and Cobalt Strike teams. Spots are limited, so be sure to drop in early!


Core Impact รีโพสต์แล้ว

Want a sneak peek of the next #CobaltStrike release? We can't wait to show you what we've been working on, so we're offering a preview of upcoming features in our next live demo. Register now and we'll see you August 27! ow.ly/wJtW50Wxyl9

_CobaltStrike's tweet image. Want a sneak peek of the next #CobaltStrike release? We can't wait to show you what we've been working on, so we're offering a preview of upcoming features in our next live demo. Register now and we'll see you August 27!
 ow.ly/wJtW50Wxyl9

Healthcare organizations face relentless threats—but penetration testing can give you an offensive security advantage. This use case shows how a hospital can level-up its security measures using Core Impact pen testing software. ow.ly/2nsh50Wu78m

_CoreImpact's tweet image. Healthcare organizations face relentless threats—but penetration testing can give you an offensive security advantage.
This use case shows how a hospital can level-up its security measures using Core Impact pen testing software.
ow.ly/2nsh50Wu78m

Whether your #BlackHat agenda is color-coded down to the minute or written on a napkin, we're ready for you! We welcome both the super-organized and the free spirits. Just make sure Booth 4422 and our in-booth sessions are on your radar. More details: ow.ly/70pN50WsRh1

_CoreImpact's tweet image. Whether your #BlackHat agenda is color-coded down to the minute or written on a napkin, we're ready for you! We welcome both the super-organized and the free spirits. Just make sure Booth 4422 and our in-booth sessions are on your radar. 
More details: ow.ly/70pN50WsRh1

Three weeks to go until Black Hat USA 2025! Visit the Fortra team, get a deep dive into our best-in-class #offsec solutions, and learn how we can help you break the attack chain. Check out all the ways you can connect with us at Black Hat: ow.ly/kAmG50Wrpbf

_CoreImpact's tweet image. Three weeks to go until Black Hat USA 2025! 
Visit the Fortra team, get a deep dive into our best-in-class #offsec solutions, and learn how we can help you break the attack chain.

Check out all the ways you can connect with us at Black Hat: ow.ly/kAmG50Wrpbf

Will We See You at SecretCon 2025? Visit us at the Fortra table and talk with our Offensive Security experts about Core Impact, Cobalt Strike, Outflank Security Tooling, and more! hubs.la/Q03snhFF0 #SecretCon #Cybersecurity #Infosec

_CoreImpact's tweet image. Will We See You at SecretCon 2025? 
Visit us at the Fortra table and talk with our Offensive Security experts about Core Impact, Cobalt Strike, Outflank Security Tooling, and more!  hubs.la/Q03snhFF0   

#SecretCon #Cybersecurity #Infosec

We've decided that June is all about seeing you soon(#rhymetime)! We are making the rounds at some incredible events, and we would love to connect with you in person at #ShowMeCon25, #SecretCon25, #x33fcon, and/or #TROOPERS25! @ShowMeConSTL @x33fcon @WEareTROOPERS

_CoreImpact's tweet image. We've decided that June is all about seeing you soon(#rhymetime)! We are making the rounds at some incredible events, and we would love to connect with you in person at #ShowMeCon25, #SecretCon25, #x33fcon, and/or #TROOPERS25!
@ShowMeConSTL @x33fcon @WEareTROOPERS

Loading...

Something went wrong.


Something went wrong.