Black Hills Information Security, Inc.
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC Team
    • Interns
    • BHIS Family of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blogs
    • Podcasts
    • PROMPT# Zine
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • Upcoming Events
    • YouTube
  • Training
  • WWHF
BLOG_chalkboard_000691

C2, External/Internal, Matthew Eidelberg, Red Team, Red Team Tools Exploit Dev, Malware Dev

Proxying Your Way to Code Execution – A Different Take on DLL Hijacking 

While DLL hijacking attacks can take on many different forms, this blog post will explore a specific type of attack called DLL proxying, providing insights into how it works, the potential risks it poses, and briefly the methodology for discovering these vulnerable DLLs, which led to the discovery of several zero-day vulnerable DLLs that Microsoft has acknowledged but opted to not fix at this time.

Read the entire post here
WC_wrap-up_w0003

Informational, James Marrs, Kiersten Gross, Webcast Wrap-Up, Webcasts Audit Inspector, Cyber Investigation, Logging, Sysmon, Windows logs

How Logging Strategies Can Affect Cyber Investigations w/ Kiersten & James 

This webcast was originally published on September 12, 2024.   In this video, Kirsten Gross and James Marrs discuss how logging strategies can affect cyber investigations, specifically focusing on Windows logs. […]

Read the entire post here
msDS-KeyCredentialLink_header

Blue Team, Incident Response, Informational, Jordan Drysdale Blue Team Detections, detection engineering, event auditing, msDS-KeyCredentialLink, Shadow creds

Enable Auditing of Changes to msDS-KeyCredentialLink 

Changes to the msds-KeyCredentialLink attribute are not audited/logged with standard audit configurations. This required serious investigations and a partner firm in infosec provided us the answer: TrustedSec.  So, credit where […]

Read the entire post here
BLOG_chalkboard_000687

Blue Team, David Perez, Incident Response, Informational Azure, Entra ID, SIEM, SOC

Monitoring High Risk Azure Logins 

Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules, […]

Read the entire post here
BLOG_chalkboard_00686

General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, Serena DiPenti InfoSec Survival Guide, Social Media

How to Put Yourself Out There – Networking on Social Media

It is no surprise that growing your social network can help get your name out there and provide opportunities to advance your career. LinkedIn, one of the original career-focused networking […]

Read the entire post here
BLOG_chalkboard_00688

General InfoSec Tips & Tricks, Guest Author, How-To, Informational, InfoSec 101 Infosec for Beginners, InfoSec Survival Guide, Job Hunting

How to Get a Job in Cybersecurity

by Gerald Auger of Simply Cyber // Guest Author You want to break into cybersecurity? That’s AWESOME. I’ve been in the field for 20 years and I LOVE IT! But […]

Read the entire post here
BLOG_chalkboard_00685

Bronwen Aker, Fun & Games, General InfoSec Tips & Tricks, How-To, Informational AI, Chatbots, ChatGPT, LLM

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs

| Bronwen Aker // Sr. Technical Editor, M.S. Cybersecurity, GSEC, GCIH, GCFE Go online these days and you will see tons of articles, posts, Tweets, TikToks, and videos about how […]

Read the entire post here
BLOG_chalkboard_00684

Ashley Knowles, Informational, Phishing, Red Team, Social Engineering InfoSec Survival Guide

How to Perform and Combat Social Engineering

This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical copy on the Spearphish General Store. […]

Read the entire post here
BLOG_chalkboard_00683

Cameron Cartier, General InfoSec Tips & Tricks, Informational, InfoSec 101, Recon, Wireless Kismet, wifi

Ghost in the Wireless: An introduction to Airspace Analysis with Kismet 

This is the first installment in a series of blogs relating to practical analysis of wireless communications: what they are, how they work, and how they can be attacked. In […]

Read the entire post here
«‹ 5 6 7 8›»

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • copilotbronwen_headerCaging Copilot: Lessons Learned in LLM Security
    For those of us in cybersecurity, there are a lot of
  • copilot_headerAugmenting Penetration Testing Methodology with Artificial Intelligence – Part 2: Copilot
    A common use case for LLMs is rapid software
  • burpference_headerAugmenting Penetration Testing Methodology with Artificial Intelligence – Part 1: Burpference
    Burpference is a Burp Suite plugin that takes requests

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team bypassing AV C2 Carrie Roberts cloud Cyber Deception encryption hacking infosec Infosec for Beginners Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2024


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site