โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Bypassing WAFs Using Oversized Requests

By: BHIS
15 October 2025 at 10:00

Many web application firewalls (WAFs) can be bypassed by simply sending large amounts of extra data in the request body along with your payload. Most WAFs will only process requests up to a certain size limit. How the WAF is configured to handle these large requests determines exploitability, but some common WAFs will allow it by default.

The post Bypassing WAFs Using Oversized Requests appeared first on Black Hills Information Security, Inc..

Bitdefender Tops Breach Prevention and TCO in Latest AV-Comparatives EPR Tests

The cybersecurity industry has long debated whether prevention or detection is more important. The AV-Comparatives EPR Comparative Report 2025 settles the debate. By measuring both, it reveals that prevention-first is the winning strategyโ€”stronger, simpler, and more cost-effective. Bitdefenderย GravityZone didnโ€™t just participate in the evaluation; it led across the board. Bitdefender achieved the highest detection rate among all participating vendors and the lowest Total Cost of Ownership (TCO), underscoring a commitment to both security efficacy and operational efficiency. The evaluation also proves that modern security means blocking threats before they disrupt business. ย 

Bitdefender Named the Only Visionary in 2025 Gartnerยฎ Magic Quadrantโ„ข for Endpoint Protection Platforms

Bitdefender Recognized for a Third Consecutive Year for Its Ability to Execute andย Completeness of Visionย  Bitdefender is proud to announce that we have been named the only Visionary in theย 2025 Gartnerยฎ Magic Quadrantโ„ข for Endpoint Protection Platforms (EPP). This marks Bitdefenderโ€™s third consecutive placement in the Visionary Quadrantโ€”a distinction we believe reflects our unwavering commitment to innovation, customer-centric security, and consistent execution in a rapidly evolving threat landscape.ย 

Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 3: Arcanum Cyber Security Bot

By: BHIS
25 June 2025 at 10:00

In my journey to explore how I can use artificial intelligence to assist in penetration testing, I experimented with a security-focused chat bot created by Jason Haddix called Arcanum Cyber Security Bot (available on https://chatgpt.com/gpts). Jason engineered this bot to leverage up-to-date technical information related to application security and penetration testing.

The post Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 3: Arcanum Cyber Security Bot appeared first on Black Hills Information Security, Inc..

Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 1: Burpference

By: BHIS
7 May 2025 at 10:00

Burpference is a Burp Suite plugin that takes requests and responses to and from in-scope web applications and sends them off to an LLM for inference. In the context of artificial intelligence, inference is taking a trained model, providing it with new information, and asking it to analyze this new information based on its training.

The post Augmenting Penetration Testing Methodology with Artificial Intelligence โ€“ Part 1: Burpference appeared first on Black Hills Information Security, Inc..

Why Your Org Needs a Penetration Test Program

By: BHIS
10 March 2025 at 11:30

This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your [โ€ฆ]

The post Why Your Org Needs a Penetration Test Program appeared first on Black Hills Information Security, Inc..

Creating Burp Extensions: A Beginnerโ€™s Guide

By: BHIS
6 January 2025 at 13:10

In this video, Dave Blandford discusses a beginner's guide to creating Burp Suite extensions. The session covers an overview of what Burp extensions are, how they can improve testing capabilities, and the tools and languages used in developing them.

The post Creating Burp Extensions: A Beginnerโ€™s Guide appeared first on Black Hills Information Security, Inc..

What Is Penetration Testing?

By: BHIS
7 November 2024 at 10:00

In todayโ€™s world, security is more important than ever. As organizations increasingly rely on technology to drive business, digital threats are becoming more sophisticated, varied, and difficult to defend against. [โ€ฆ]

The post What Is Penetration Testing? appeared first on Black Hills Information Security, Inc..

Reconnaissance: Azure Cloud w/ Kevin Klingbile

By: BHIS
7 October 2024 at 11:16

This webcast was originally published on September 26, 2024. In this video, Kevin Klingbile from Black Hills Information Security discusses the intricacies of Azure Cloud services and M365, focusing on [โ€ฆ]

The post Reconnaissance: Azure Cloud w/ Kevin Klingbile appeared first on Black Hills Information Security, Inc..

Red Teaming: A Story From the Trenches

By: BHIS
18 April 2024 at 13:08

This article originally featured in the very first issue of our PROMPT# zine โ€” Choose Wisely. You can find that issue (and all the others) here: https://www.blackhillsinfosec.com/prompt-zine/ I remember a [โ€ฆ]

The post Red Teaming: A Story From the Trenches appeared first on Black Hills Information Security, Inc..

โŒ
โŒ