Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books

Author, Beau Bullock, Mike Felch, Webcasts Cryptocurrency, Cryptocurrency Security, webcast

WEBCAST: A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems

Mike Felch and Beau Bullock// Cryptocurrency conversations are everywhere you look! Mike Felch and Beau Bullock were so interested they started their own podcast about the topic. We’re excited to […]

Read the entire post here
image1

C2, Informational PowerShell, SSL decrypting

Are You Spying on me? Detecting SSL Man-in-the-Middle

Carrie Roberts//* Is your employer reading all your sensitive information when you browse the internet from your work computer? Probably. But how can you be sure? It is common for […]

Read the entire post here
I Spy with InSpy

Recon, Red Team Tools InSpy, password spray, recon tool

I Spy with InSpy

Darin Roberts// Do you ever find yourself on an engagement and need just a few more names with which to conduct a password spray? Everyone knows the more emails you have, […]

Read the entire post here
Deploy REMnux to the Cloud, Reverse Engineering Malware in the Cloud

Author, How-To, John Strand cloud, REMnux, Reverse Engineering Malware

Deploy REMnux to the Cloud, Reverse Engineering Malware in the Cloud

Carrie Roberts //* REMnux is a free virtual machine image with Reverse Engineering Malware tools preinstalled. REMnux is maintained by Lenny Zeltser with extensive help from David Westcott and is available from https://remnux.org. I have […]

Read the entire post here
Treating Antivirus as “The Gold Standard”

Author, C2, Informational, John Strand anti-virus, AV, AV bypass, Bash, cash cow tipping, TrevorC2, webcast

Treating Antivirus as “The Gold Standard”

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

Read the entire post here

Author, John Strand, Webcasts Cubicles and Compromises, Incident Response, IR, webcast

WEBCAST: Cubicles and Compromises

John Strand// Here’s a live demo of John’s recent blog post that talked about gamifying your table top Dungeon and Dragons style. Join John, Kent, Jordan and Sierra as they […]

Read the entire post here
Cubicles and Compromises

Author, How-To, John Strand, Webcasts Cubicles and Compromises, Dungeons & Dragons, Incident Response, IR, Table Top, webcast

Cubicles and Compromises Printable

John Strand// Thanks for joining us for our Cubicles and Compromises webcast! We also have a recording available soon! In the meantime, here’s a blog post explanation: And, here you’ll […]

Read the entire post here
00265_01162018_WEBCAST_SacredCashCowTipping2018

Author, John Strand, Webcasts AV, AV bypass, bypassing AV, Sacred Cash Cow Tipping, webcasts

WEBCAST: Sacred Cash Cow Tipping 2018

John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if […]

Read the entire post here
labs

Author, David Fletcher, How-To Keeloq FOB, Labs, SDR, Software Defined Raid, Wild West Hackin' Fest

Wild West Hackin’ Fest (WWHF) SDR Labs

David Fletcher // During WWHF we had a number of attendees ask for the Software Defined Radio (SDR) lab parts list and source code so that they could experiment at […]

Read the entire post here
«‹ 51 52 53 54›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site