❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Light at the End of the Dark Web

By: BHIS
3 March 2025 at 11:00

Join us for this one-hour Black Hills Information Security webcast with Joseph - Security Analyst, as he shares with you what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.

The post Light at the End of the Dark Web appeared first on Black Hills Information Security, Inc..

Introduction to Zeek Log Analysis

By: BHIS
13 January 2025 at 11:00

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

DLL Hijacking – A New Spin on Proxying your Shellcode

By: BHIS
14 October 2024 at 11:20

This webcast was originally published on October 4, 2024. In this video, experts delve into the intricacies of DLL hijacking and new techniques for malicious code proxying, featuring a comprehensive […]

The post DLL Hijacking – A New Spin on Proxying your Shellcode appeared first on Black Hills Information Security, Inc..

Reconnaissance: Azure Cloud w/ Kevin Klingbile

By: BHIS
7 October 2024 at 11:16

This webcast was originally published on September 26, 2024. In this video, Kevin Klingbile from Black Hills Information Security discusses the intricacies of Azure Cloud services and M365, focusing on […]

The post Reconnaissance: Azure Cloud w/ Kevin Klingbile appeared first on Black Hills Information Security, Inc..

Webcast: Firmware Enumeration Using Open Source Tools w/ Paul Asadoorian

By: BHIS
4 November 2022 at 10:28

In this Black Hills Information Security (BHIS) webcast, Paul will share free and open-source tools and techniques to evaluate the state of security on the firmware-based devices that live inside […]

The post Webcast: Firmware Enumeration Using Open Source Tools w/ Paul Asadoorian appeared first on Black Hills Information Security, Inc..

Webcast: Pentester Tactics, Techniques, and Procedures TTPs w/ Chris Traynor

By: BHIS
4 November 2022 at 10:24

Penetration Testing is often considered a dark art that’s shrouded in mystery. This unfortunate perception can hold back organizations from being more secure and keep people from an exciting career. […]

The post Webcast: Pentester Tactics, Techniques, and Procedures TTPs w/ Chris Traynor appeared first on Black Hills Information Security, Inc..

❌
❌