
Search Results for: RITA


Joseph Lillo
Head of EngineeringJoseph Lillo rejoined Black Hills Information Security (BHIS) in 2025 as Head of Engineering, after previously working with BHIS from 2015 to 2019, where he contributed to the development of […]

Why Your Org Needs a Penetration Test Program
This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]

Questions From a Beginner Threat Hunter
Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]

One Active Directory Account Can Be Your Best Early Warning
Here we go again, discussing Active Directory, hacking, and detection engineering. tl;dr: One AD account can provide you with three detections that if implemented properly will catch common adversarial activities […]

Intro to Desktop Application Testing Methodology
In this video, experts delve into the intricacies of desktop application penetration testing methodologies.
Appalachia Advance 2024
Appalachia Technologies is excited to present Appalachia Advance 2024, a CyberTech Conference. Our 3rd annual in-person event brings together globally-recognized cybersecurity leaders and vendors with Appalachia’s own highly-certified staff to educate, […]

Enable Auditing of Changes to msDS-KeyCredentialLink
Changes to the msds-KeyCredentialLink attribute are not audited/logged with standard audit configurations. This required serious investigations and a partner firm in infosec provided us the answer: TrustedSec. So, credit where […]

Offensive IoT for Red Team Implants (Part 2)
This is Part Two of the blog series, Offensive IoT for Red Team Implants, so if you have not read PART ONE, I would encourage you do to so first […]