Author, Ben Burkhart, Webcasts Webcast: How Bartending Made Me a Better Infosec Consultant w/ Ben Burkhart Read the entire post here
Author, How-To, Troy Wojewoda, Webcasts Webcast: How DNS can be abused for Command & Control w/ Troy Wojewoda Read the entire post here
Author, Mike Felch, Webcasts Webcast: Introduction to Pentesting w/ Mike Felch Read the entire post here
Author, David Fletcher, Derek Banks, Hal Denton, Troy Wojewoda, Webcasts Webcast: How to Detect and Respond to Business Email (M365) Compromise w/ the BHIS DFIR Team Read the entire post here
Author, Corey Ham, Michael Allen, Webcasts Webcast: How to Burn Out in Infosec (and what to do next) w/ Corey Ham and Others Read the entire post here
Author, Steve Borosh, Webcasts Webcast: How to Deliver Payloads in an Enterprise Attack w/ Steve Borosh Read the entire post here
Author, Carrie Roberts, Darin Roberts, Webcasts Webcast: Atomic Red Team: Hands-on Getting Started Guide w/ Carrie & Darin Roberts Read the entire post here
Author, Kyle Avery, Webcasts Webcast: Modern C2 and Data Exfiltration w/ Kyle Avery Read the entire post here
Author, Derek Banks, Ethan Robish, Webcasts Webcast: Looking for Needles in Needlestacks w/ Threat Hunting Toolkit Read the entire post here