Building GenAI infra sounds cool—until it’s 3am and your LLM is downThis free guide helps you avoid the pitfalls. Learn the hidden costs, real-world tradeoffs, and decision framework to confidently answer: build or buy? Includes battle-tested tips from Checkr, Convirza & more. Welcome to another _secpro! For all of you who attended the RSA Conference and CyberUK, we hope you had a great time getting up to scratch with the goings on in this industry. Got something to share? Reply to this email and tell us about your thoughts. This week's issue contains: - Apple's AirPlay Vulnerabilities Expose Devices to Hijacking Risks Cheers! Reflecting on MITRE ATT&CKMaking our way through the MITRE ATT&CK's Top Ten most exploited techniques over the last 9 weeks has been fun. We're almost ready to dive into the most exploited T-number, but we thought it'd be good to stop and smell the adversarial roses for a minute first - just make sure you've been paying attention. These T-numbers are on the test, so make sure to go back and check out #10 through #2 in the list below: - #2: T1059 We have five copies of Glen Singh's Kali Linux book to give away. Leave a comment in order to win a virtual copy! RSA Conference 2025 – Navigating the New Cyber FrontierA reflection on this year's events |