Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
  • About Us
    • Testers
    • Admin
    • Partners
    • Interns
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Penetration Testing
    • Active SOC
    • Blue Team Services
    • Hunt Team (HTOC)
    • Cyber Range
  • Projects/Tools
    • All Tools
    • RITA
    • Backdoors & Breaches
    • Books
  • Learn
    • Blog
    • Webcasts
    • Podcasts
    • Training

Informational, InfoSec 101, News, Podcasts

Talkin’ About Infosec News – 11/11/2020

Originally aired on November 11, 2020 Articles discussed in this episode: https://www.darkreading.com/attacks-breaches/malware-hidden-in-encrypted-traffic-surges-amid-pandemic/d/d-id/1339420 https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

Informational, InfoSec 101, News, Podcasts

Talkin’ About Infosec News – 11/09/2020

Originally aired on 11/09/2020 Articles discussed in this episode: https://www.darkreading.com/threat-intelligence/6-ways-passwords-fail-basic-security-tests/d/d-id/1339299 https://www.infosecurity-magazine.com/news/national-guard-uvm-health-network/ https://www.zdnet.com/article/toy-maker-mattel-discloses-ransomware-attack/

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

Informational, InfoSec 101, News, Podcasts

Talkin’ About Infosec News – 10/26/2020

Originally aired on October 26, 2020.

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

Informational, InfoSec 101, News, Podcasts

Talkin’ About Infosec News – 10/21/2020

Originally aired on October 21, 2020.

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

00488_10262020_MachinIntheMiddle

General InfoSec Tips & Tricks, Hardware Hacking, How-To, Informational, InfoSec 101

Machine-in-the-Middle (MitM) BLE Attack

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of attack technique, namely a relay attack. The relay attack is a form of MitM attack, not to be confused with the more well-known replay attack.   […]

Read the entire post here

00489_10262020_WebcastSOC

How-To, Informational, Podcasts, Webcasts

Webcast: The SOC Age Or, A Young SOC Analyst’s Illustrated Primer

Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful. Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through […]

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

00487_10212020_HowToInstallMitreCALDERA

How-To, Informational

How to Install Mitre CALDERA and Configure Your SSL Certificate

Carrie & Darin Roberts // If you would like to install the Mitre CALDERA server on your own, the CALDERA GitHub page has installation instructions on their ReadMe here. Detailed steps are provided below for installing CALDERA on Ubuntu and configuring it to use your SSL certification. Clone the Repository git clone https://github.com/mitre/caldera.git –recursive –branch […]

Read the entire post here

00486_10192020_Webcast_InfosecMentoring

How-To, Informational, InfoSec 101, Podcasts, Webcasts

Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee

They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools and the need for soft-skills and the ability to navigate different types of relationships, we all need help. That’s where a formal mentor can be […]

Podcast: Play in new window | Download

Subscribe: RSS

Read the entire post here

Exploiting MFA Inconsistencies on Microsoft Services

How-To, Informational

Exploiting MFA Inconsistencies on Microsoft Services

Beau Bullock // Overview On offensive engagements, such as penetration tests and red team assessments, I have been seeing inconsistencies in how MFA is applied to the various Microsoft services. Across Microsoft 365 and Azure, there are multiple endpoints. These endpoints can all be configured under different Conditional Access policy settings, which sometimes lead to […]

Read the entire post here

«‹ 3 4 5 6 7 ›»

Follow Us

Looking For Something?

Subscribe to the BHIS blog

Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails about upcoming events! (We promise, we're not spammy!)

Browse by category

Recent Posts

  • Talkin’ About Infosec News – 4/7/2021
    Originally Aired on April 7, 2021 Articles discussed
  • Talkin’ About Infosec News – 4/5/2021
    Originally Aired on April 5, 2021 Articles discussed
  • 00523_03292021_UsingHardwareForHardwareControlUsing Infrared for Hardware Control
    Ray Felch // Overview  Infrared technology has

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Blue Team bypassing AV C2 cloud command and control hardware hacking Hashcat infosec john strand Jordan Drysdale Kent Ickler Linux LLMNR MailSniper Microsoft Nessus Nmap Password cracking password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast Podcasts PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Black Hills Information Security

115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS
© 2008

Links
Search the site