When the SOC Goes to Deadwood: A Night to Remember
Hear a tale about the time the BHIS SOC team conducted a 14-hour overnight incident response… from the Wild West Hackin’ Fest conference in Deadwood, South Dakota.
Hear a tale about the time the BHIS SOC team conducted a 14-hour overnight incident response… from the Wild West Hackin’ Fest conference in Deadwood, South Dakota.
This scenario simultaneously tests identity confirmation tooling (SSPR, MFA, Conditional Access), how users act under pressure, and the organization’s ability to detect and follow-up on social engineering attacks.
In today’s interconnected digital world, information security has become a critical concern for individuals, businesses, and governments alike. Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data.
This blog is for anyone who is interested in finding a good penetration testing company.
Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.
By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the client’s […]
Setting goals is a deceptively simple career skill we all know is important, but how do you set goals you’re actually excited to work towards?
What happens when you ditch the tiered ticket queues and replace them with collaboration, agility, and real-time response? In this interview, Hayden Covington takes us behind the scenes of the BHIS Security Operations Center, which is where analysts don’t escalate tickets, they solve them.
This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven’t already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.