❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Light at the End of the Dark Web

By: BHIS
3 March 2025 at 11:00

Join us for this one-hour Black Hills Information Security webcast with Joseph - Security Analyst, as he shares with you what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.

The post Light at the End of the Dark Web appeared first on Black Hills Information Security, Inc..

AI Large Language Models and Supervised Fine Tuning

By: BHIS
23 January 2025 at 10:00

This blog post is aimed at the intermediate level learner in the fields of data science and artificial intelligence. If you would like to read up on some fundamentals, here […]

The post AI Large Language Models and Supervised Fine Tuning appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 2: Offensive DevOps

By: BHIS
29 February 2024 at 09:00

The Challenge As stated in PART 1 of this blog, the Windows endpoint defense technology stack in a mature organization represents a challenge for Red Teamer initial access operations. For […]

The post Initial Access Operations Part 2: Offensive DevOps appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape

By: BHIS
22 February 2024 at 11:00

Today’s endpoint defense landscape on the Windows desktop platform is rich with product offerings of quite sophisticated capabilities. Beyond the world of antivirus products, Extended Detection and Response (XDR), and […]

The post Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape appeared first on Black Hills Information Security, Inc..

Dynamic Device Code PhishingΒ 

By: BHIS
16 May 2023 at 15:55

rvrsh3ll //Β  IntroductionΒ  This blog post is intended to give a light overview of device codes, access tokens, and refresh tokens. Here, I focus on the technical how-to for standing […]

The post Dynamic Device Code PhishingΒ  appeared first on Black Hills Information Security, Inc..

The DNS over HTTPS (DoH) Mess

15 February 2022 at 14:36

Joff Thyer // I woke up this Monday morning thinking that it’s about time I spent time looking at my Domain Name Service (DNS) configuration in my network. (This thought […]

The post The DNS over HTTPS (DoH) Mess appeared first on Black Hills Information Security, Inc..

Are You Really Hacking Naked?

By: BHIS
12 October 2017 at 11:01

Joff Thyer // I had an interesting experience recently that reminded me to always β€œtrust but verify.” Let me set the stage for you. As a penetration tester, and IT […]

The post Are You Really Hacking Naked? appeared first on Black Hills Information Security, Inc..

Certificate Transparency Means What, Again?

By: BHIS
28 October 2016 at 11:06

Brian King // News from Google this week says that Chrome will start enforcing Certificate Transparency a year from now. https://groups.google.com/a/chromium.org/forum/#!topic/ct-policy/78N3SMcqUGw This means that when Chrome contacts a website, if […]

The post Certificate Transparency Means What, Again? appeared first on Black Hills Information Security, Inc..

AppleTV & nmap -sV

By: BHIS
11 October 2016 at 10:21

BBKing // So I’m working the other day, and my wife asks me why the TV is on. I don’t know. I didn’t turn it on. But it’s near my […]

The post AppleTV & nmap -sV appeared first on Black Hills Information Security, Inc..

❌
❌