❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Microsoft Store and WinGet: Security Risks for Corporate Environments

By: BHIS
10 September 2025 at 12:05

The Microsoft Store provides a convenient mechanism to install software without needing administrator permissions. The feature is convenient for non-corporate and home users but is unlikely to be acceptable in corporate environments. This is because attackers and malicious employees can use the Microsoft Store to install software that might violate organizational policy.Β 

The post Microsoft Store and WinGet: Security Risks for Corporate Environments appeared first on Black Hills Information Security, Inc..

Introducing Squeegee: The Microsoft Windows RDP Scraping Utility

By: BHIS
17 May 2024 at 12:00

Hi, it’s David with BHIS! You’ll be saying, β€œWow,” every time you use this tool. It’s like a shammy. It’s like a towel. It’s like a sponge. A regular towel […]

The post Introducing Squeegee: The Microsoft Windows RDP Scraping Utility appeared first on Black Hills Information Security, Inc..

Pushing Your Way In

By: BHIS
9 July 2021 at 11:28

David Fletcher // Over the past several years, attackers have gained significant traction in targeted environments by using various forms of password guessing.Β This situation was reflected in the 2020 Verizon […]

The post Pushing Your Way In appeared first on Black Hills Information Security, Inc..

Finding Buried Treasure in Server Message Block (SMB)

By: BHIS
19 April 2021 at 14:45

David Fletcher // Service Message Block (SMB) shares can represent a significant risk to an organization.Β Companies often lack aΒ realisticΒ understanding of the exposure thatΒ SMB sharesΒ represent.Β Effective management typically requires aΒ sound information management […]

The post Finding Buried Treasure in Server Message Block (SMB) appeared first on Black Hills Information Security, Inc..

Backdoors & Breaches: Logon Scripts

By: BHIS
6 April 2020 at 08:15

David Fletcher // This blog post discusses the relevance and techniques involved in logon script abuse. While the Backdoors & Breaches card is featured for this topic, the post will […]

The post Backdoors & Breaches: Logon Scripts appeared first on Black Hills Information Security, Inc..

Check Your Perimeter

By: BHIS
23 March 2020 at 08:05

David Fletcher // With so many organizations transitioning to remote work in order to stem the tide of COVID-19 infections, we wanted to cover some of the configuration elements you […]

The post Check Your Perimeter appeared first on Black Hills Information Security, Inc..

Webcast: Weaponizing Active Directory

By: BHIS
19 August 2019 at 13:09

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WeaponizingActiveDirectory.pdf 0:54 Background behind this webcast, what and […]

The post Webcast: Weaponizing Active Directory appeared first on Black Hills Information Security, Inc..

Finding: Server Supports Weak Transport Layer Security (SSL/TLS)

By: BHIS
14 June 2018 at 09:32

David Fletcher// The following blog post is meant to expand upon the findings commonly identified in BHIS reports. Β The β€œServer Supports Weak Transport Layer Security (SSL/TLS)” is almost universal across […]

The post Finding: Server Supports Weak Transport Layer Security (SSL/TLS) appeared first on Black Hills Information Security, Inc..

Finding: Weak Password Policy

By: BHIS
24 May 2018 at 11:15

David Fletcher// The weak password policy finding is typically an indicator of one of two conditions during a test: A password could be easily guessed using standard authentication mechanisms. A […]

The post Finding: Weak Password Policy appeared first on Black Hills Information Security, Inc..

Wild West Hackin’ Fest (WWHF) SDR Labs

By: BHIS
10 January 2018 at 11:15

David Fletcher // During WWHF we had a number of attendees ask for the Software Defined Radio (SDR) lab parts list and source code so that they could experiment at […]

The post Wild West Hackin’ Fest (WWHF) SDR Labs appeared first on Black Hills Information Security, Inc..

WEBCAST- WWHF Lab Exploration: Hands-on RF Attacks

By: BHIS
11 September 2017 at 12:24

David Fletcher// Join David as he takes a look at one of the many labs that we’ll be offering during Wild West Hackin’ Fest. This lab explores signal analysis and […]

The post WEBCAST- WWHF Lab Exploration: Hands-on RF Attacks appeared first on Black Hills Information Security, Inc..

Internet of Things Exploration: 2016 Ford Flex

By: BHIS
31 August 2017 at 09:43

David Fletcher// My wife and I recently purchased a 2016 Ford Flex to replace an aging version of the same make and model that met an untimely fate. During the […]

The post Internet of Things Exploration: 2016 Ford Flex appeared first on Black Hills Information Security, Inc..

How To: Empire’s Cross Platform Office Macro

By: BHIS
7 August 2017 at 09:57

David Fletcher // During our testing, we encounter organizations of various different sizes, shapes, and composition. Β One that we’ve run across a number of times includes a fairly even mixture […]

The post How To: Empire’s Cross Platform Office Macro appeared first on Black Hills Information Security, Inc..

❌
❌