❌

Reading view

There are new articles available, click to refresh the page.

Model Context Protocol (MCP)

The Model Context Protocol (MCP) is a proposed open standard that provides a two-way connection for AI-LLM applications to interact directly with external data sources. It is developed by Anthropic and aims to simplify AI integrations by reducing the need for custom code for each new system.

The post Model Context Protocol (MCP) appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 2: Offensive DevOps

The Challenge As stated in PART 1 of this blog, the Windows endpoint defense technology stack in a mature organization represents a challenge for Red Teamer initial access operations. For […]

The post Initial Access Operations Part 2: Offensive DevOps appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape

Today’s endpoint defense landscape on the Windows desktop platform is rich with product offerings of quite sophisticated capabilities. Beyond the world of antivirus products, Extended Detection and Response (XDR), and […]

The post Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape appeared first on Black Hills Information Security, Inc..

Dynamic Device Code PhishingΒ 

rvrsh3ll //Β  IntroductionΒ  This blog post is intended to give a light overview of device codes, access tokens, and refresh tokens. Here, I focus on the technical how-to for standing […]

The post Dynamic Device Code PhishingΒ  appeared first on Black Hills Information Security, Inc..

How to Build a Soft Access Point in Ubuntu 16.04

David Fletcher// This blog post is going to illustrate setting up a software access point (AP) on Ubuntu 16.04. Β Having the ability to create a software AP can be very […]

The post How to Build a Soft Access Point in Ubuntu 16.04 appeared first on Black Hills Information Security, Inc..

Certificate Transparency Means What, Again?

Brian King // News from Google this week says that Chrome will start enforcing Certificate Transparency a year from now. https://groups.google.com/a/chromium.org/forum/#!topic/ct-policy/78N3SMcqUGw This means that when Chrome contacts a website, if […]

The post Certificate Transparency Means What, Again? appeared first on Black Hills Information Security, Inc..

Bitlocker Ransomware: Using BitLocker for Nefarious Reasons

Editor’s Note: We’re excited to publish our first guest post! Β If you’d like to guest post on our blog DM us on Twitter, or use our contact formΒ to contact us […]

The post Bitlocker Ransomware: Using BitLocker for Nefarious Reasons appeared first on Black Hills Information Security, Inc..

Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034

Mick Douglas // Current Status: – MS15-034 has remote Denial of Service (DoS) – Remote exploit code appears to be ready soon… maybe. Β Stay tuned. BLUE TEAM MARCHING ORDERS: – […]

The post Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034 appeared first on Black Hills Information Security, Inc..

❌