Enterprise Attack Initial Access w/ Steve Borosh
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Since 2003, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation, but do you really understand what each of these issues and their corresponding controls mean? As a developer, do you know how to prevent these issues? As a security professional, […]
Thursday, August 25, 2022 – 1 pm (UTC -4) Register: https://zoom.us/webinar/register/WN_Nwx4p22dT_-SuGekLdjExQ Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy. In version 6.0 of AC-Hunter, we added a Cyber Deception module. This module allows for the creation and monitoring of two […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Hi friends! The Black Hills Team is in town for BSides Atlanta on Saturday, August 27th, and we would love to catch up with you the Friday before! If you'd like to hang out with us, hang out with each other, and pick up some cool swag, RSVP so we'll know how to plan.
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
Register: https://www.antisyphontraining.com/enterprise-security-for-all-w-bob-hewitt-rich-fifarek/ This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization. SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due […]