Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books

Author, Steve Borosh, Webcasts

Webcast: How to Deliver Payloads in an Enterprise Attack w/ Steve Borosh

Read the entire post here

Author, Carrie Roberts, Darin Roberts, Webcasts

Webcast: Atomic Red Team: Hands-on Getting Started Guide w/ Carrie & Darin Roberts

Read the entire post here

Author, Kyle Avery, Webcasts

Webcast: Modern C2 and Data Exfiltration w/ Kyle Avery

Read the entire post here

Author, Derek Banks, Ethan Robish, Webcasts

Webcast: Looking for Needles in Needlestacks w/ Threat Hunting Toolkit

Read the entire post here

Author, Kyle Avery, Webcasts

Webcast: Getting Started in Covert .NET Tradecraft for Post-Exploitation – Kyle Avery

Read the entire post here

Author, Backdoors & Breaches, Blue Team, Fun & Games, Jason Blanchard, Webcasts

How to Play Competitive Backdoors & Breaches w/ Jason Blanchard (1-Hour)

Read the entire post here

Author, Ralph May, Webcasts

DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)

Read the entire post here

Author, David Fletcher, Jordan Drysdale, Red Team, Red Team Tools, Webcasts

Webcast: Attack Tactics 8 – Poison the Well – Jordan Drysdale & David Fletcher

Read the entire post here

Informational

Talkin’ About Infosec News – 10/17/2022

00:00 – PreShow Banter™ — Dumpster Fire Friends03:07 – PreShow Banter™ — WHHF Deadwood – https://wildwesthackinfest.com/deadwood/ 03:48 – BHIS – Talkin’ Bout [infosec] News 2022-10-0307:37 – Story # 1: High-severity […]

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Spotify | Amazon Music | RSS

Read the entire post here
«‹ 22 23 24 25›»

Looking For Something?

Browse by category

Recent Posts

  • Proxy execution via WebView2 bannerSigned, Trusted, and Abused: Proxy Execution via WebView2
    An offensive security perspective on Microsoft Edge
  • Getting Started in PentestingGetting Started In Pentesting – Advice From The BHIS Pentest Lead
    Advice about getting started in pentesting from the
  • Tips and Resources for Securing the CloudCloud Security: Tips and Resources for Securing the Cloud
    This overview of the basics of Cloud Security includes

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site