❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Treating Antivirus as β€œThe Gold Standard”

By: BHIS
29 January 2018 at 10:27

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

The post Treating Antivirus as β€œThe Gold Standard” appeared first on Black Hills Information Security, Inc..

WEBCAST: Sacred Cash Cow Tipping 2018

By: BHIS
16 January 2018 at 18:48

John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if […]

The post WEBCAST: Sacred Cash Cow Tipping 2018 appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 2 – Using DNSCat2

By: BHIS
28 March 2017 at 10:22

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

Power Posing with PowerOPS

By: BHIS
25 January 2017 at 11:13

Brian FehrmanΒ // As described in my last blog post,Β Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AVΒ (sheeesh…it’s been a bit!), we are seeing more environments in […]

The post Power Posing with PowerOPS appeared first on Black Hills Information Security, Inc..

❌
❌