❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayBlack Hills Information Security

Swapper – A Pure Regex Match/Replace Burp Extension

By: BHIS
6 May 2026 at 10:00

To get a valid session token to use with Burp Suite tools, I ended up writing a small Python extension (110 lines of code, but who’s counting?) that obtained a new session token for each request, allowing items like Intruder to work as intended. Cool, I was able to use it during the test, but I would like this to be repeatable. So, this blog is releasing Swapper, a regex pattern-based match/replace Burp Suite extension.

The post Swapper – A Pure Regex Match/Replace Burp Extension appeared first on Black Hills Information Security, Inc..

Network Engineering Basics

By: BHIS
22 April 2026 at 11:40

The computer networking field is broad, encompassing many focus areas similar to cybersecurity. If you’re new to the field or just interested in networking, knowing where to start can be challenging. Searching for a network engineer position on any job listing site will yield thousands of results, and no two job descriptions will be the same.

The post Network Engineering Basics appeared first on Black Hills Information Security, Inc..

Malware Analysis: How to Analyze and Understand Malware

By: BHIS
25 February 2026 at 09:00

Malware analysis is an amazing field that can be interesting, fun, and useful for your cybersecurity career. If you’re wondering WHY anyone would want to dig into malware, it’s all for a better understanding of cybersecurity!

The post Malware Analysis: How to Analyze and Understand Malware appeared first on Black Hills Information Security, Inc..

When the SOC Goes to Deadwood: A Night to RememberΒ 

By: BHIS
4 February 2026 at 09:00

Hear a tale about the time the BHIS SOC team conducted a 14-hour overnight incident response... from the Wild West Hackin' Fest conference in Deadwood, South Dakota.

The post When the SOC Goes to Deadwood: A Night to RememberΒ  appeared first on Black Hills Information Security, Inc..

Common Cyber Threats

By: BHIS
21 January 2026 at 09:00

In today’s interconnected digital world, information security has become a critical concern for individuals, businesses, and governments alike. Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data.

The post Common Cyber Threats appeared first on Black Hills Information Security, Inc..

The Curious Case of theΒ Comburglar

By: BHIS
18 December 2025 at 12:55

By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the client’s […]

The post The Curious Case of theΒ Comburglar appeared first on Black Hills Information Security, Inc..

❌
❌