Author, Tim Fowler, Webcasts Webcast: Offensive Windows Event Logs w/ Tim Fowler Read the entire post here
Author, Beau Bullock, Steve Borosh, Webcasts Webcast: Demystifying Web3 Attack Vectors, w/ Beau Bullock and Steve Borosh Read the entire post here
Author, CJ Cox, Webcasts Webcast: Getting Started: Cybersecurity Maturity Model Certification (CMMC) w/ CJ Cox & Adam Austin Read the entire post here
Author, Ben Burkhart, Webcasts Webcast: How Bartending Made Me a Better Infosec Consultant w/ Ben Burkhart Read the entire post here
Author, How-To, Troy Wojewoda, Webcasts Webcast: How DNS can be abused for Command & Control w/ Troy Wojewoda Read the entire post here
Author, Mike Felch, Webcasts Webcast: Introduction to Pentesting w/ Mike Felch Read the entire post here
Author, David Fletcher, Derek Banks, Hal Denton, Troy Wojewoda, Webcasts Webcast: How to Detect and Respond to Business Email (M365) Compromise w/ the BHIS DFIR Team Read the entire post here
Author, Corey Ham, Michael Allen, Webcasts Webcast: How to Burn Out in Infosec (and what to do next) w/ Corey Ham and Others Read the entire post here
Author, Steve Borosh, Webcasts Webcast: How to Deliver Payloads in an Enterprise Attack w/ Steve Borosh Read the entire post here