Black Hills Information Security, Inc.
RSS
  • All Services
    • Complete Service Guide
    • Active SOC
    • AI Security Assessments
    • Blockchain Security
    • Blue Team Services
    • Continuous Penetration Testing
    • High-Profile Risk Assessments
    • Incident Response
    • Penetration Testing
  • Contact Us
    • Contact Us
    • Email Sign-Up
  • About Us
    • Security Consultants
    • Admin Team
    • Active SOC Team
    • Antisyphon Training
    • BHIS Tribe of Companies
  • Free Resources
    • Blogs
    • Free Cybersecurity Tools
    • Free Cybersecurity Webcasts
    • Podcasts
    • RITA
  • Training
    • BHIS & Antisyphon Training
    • WWHF Conference
  • Community
    • Discord
    • LinkedIn
    • YouTube
    • Bluesky
    • Twitter/X
    • Upcoming Events
  • Fun Stuff
    • Backdoors & Breaches
    • Merch, Zines & More
    • PROMPT# Zine
    • REKCAH
    • Books
WC_wrap-up_W0019

Corey Ham, External/Internal, GRC, Red Team, Webcast Wrap-Up Kelli Tarala, penetration testing, pentest

Why Your Org Needs a Penetration Test Program

This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]

Read the entire post here
BLOG_chalkboard_00711

Chris Sullo, General InfoSec Tips & Tricks, Web App Burp Suite, Copy For

Burp Suite Extension: Copy For 

If you’ve ever had to take a request from Burp and turn it into a command line, especially for jwt_tool.py, you know it can be painful—but no more! The “Copy For” extension is here to save valuable time. 

Read the entire post here
WC_wrap-up_W0018

Informational, InfoSec 301, Webcast Wrap-Up, Webcasts Dark Web, Tor

Light at the End of the Dark Web

Join us for this one-hour Black Hills Information Security webcast with Joseph – Security Analyst, as he shares with you what he’s discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.

Read the entire post here
BLOG_chalkboard_00710 (1)

Ben Bowman, Hardware Hacking, Informational, Wireless wi-fi, Wi-Fi Forge

Wi-Fi Forge: Practice Wi-Fi Security Without Hardware 

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

Read the entire post here
BLOG_chalkboard_00709

Brian Fehrman, How-To, Informational AI, Artificial Intelligence, LangChain, LangSmith, Large Language Models, LLM, Machine Learning, Ollama, RAG, Retrieval-Augmented Generation

Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain

RAG connects pre-trained LLMs with current data sources. Moreover, a RAG system can use many data sources.

Read the entire post here
BLOG_chalkboard_00708

External/Internal, How-To, Informational, Nick Caswell, Phishing, Red Team, Red Team Tools, Social Engineering GoPhish, Mail Security, Phishing Campaign

Gone Phishing: Installing GoPhish and Creating a Campaign

GoPhish provides a nice platform for creating and running phishing campaigns. This blog will guide you through installing GoPhish and creating a campaign. 

Read the entire post here
Rant_header

Blue Team, Incident Response, John Strand, Red Team, Webcast Wrap-Up AI, cloud, penetration testing

5 Things We Are Going to Continue to Ignore in 2025

In this video, John Strand discusses the complexities and challenges of penetration testing, emphasizing that it goes beyond just finding and exploiting vulnerabilities.

Read the entire post here
promptplan_header (1)

General InfoSec Tips & Tricks, How-To, Informational, InfoSec 101, John Strand Infosec for Beginners, PROMPT#, SOC Issue

John Strand’s 5 Phase Plan For Starting in Computer Security

This article was originally published in the SOC Issue of our PROMPT# zine, which you can read for free HERE. The information was adapted from the 2018 webcast “John Strand’s […]

Read the entire post here
promptthreat_header

Hunt Teaming, Informational, InfoSec 101 Beginner, On the Hunt, PROMPT#, Q&A, threat hunting

Questions From a Beginner Threat Hunter

Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]

Read the entire post here
«‹ 7 8 9 10›»

Looking For Something?

Browse by category

Recent Posts

  • How To Lead Effective Cybersecurity TabletopsHow to Lead Effective Tabletops
    Learn how to transform boring, meeting-style security
  • grc_header (1)Understanding GRC: How to Navigate Risks and Compliance Standards
    “GRC” isn’t all witchcraft and administrative
  • Linux Persistence For PentestersThe “P” in PAM is for Persistence: Linux Persistence Technique
    Learn about a pentesting tool using the Pluggable

Browse by topic

Active Directory ADHD AI anti-virus Attack Tactics AV Beau Bullock BHIS Blue Team C2 Carrie Roberts cloud Cyber Deception hacking infosec Infosec for Beginners InfoSec Survival Guide Joff Thyer john strand Jordan Drysdale Kent Ickler Kerberos Linux MailSniper Malware Microsoft Nessus Nmap passwords password spraying pen-testing penetration testing pentest Pentesting phishing PowerShell Python Red Team red teaming RITA Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security, Inc.

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site