Webcast – Threat Hunter’s Toolbox
ZoomEvery threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]
Every threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]
Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy. […]
High-level packet analysis tools give us the overview of what's on a network; they save us huge amounts of time. But every once […]
Are you a red or blue teamer trying to automate infrastructure tasks? Ansible may be your solution! We are talking about the open-source […]
You read that correctly, we are releasing a free version of our network threat hunting tool, AC-Hunter! As a community, we face an […]
In this webcast, we are looking into what passive fingerprinting is and how to use Active Countermeasure's open-source tool SMUDGE. Join our Threat […]
Have you heard of the PROMPT# Magazine? It's a Free Infosec zine created by Black Hill Information Security. The most recent issue was […]
For this webcast, we have invited guest speaker Faan Rossouw to discuss his approach to threat hunting. This talk will explore how we […]
Chris and Bill are seasoned networking adventurers with years of expertise, fearlessly exploring the realms of connectivity and safeguarding digital domains through their […]
We're lucky to have hundreds of awesome packet sniffers to choose from, but what happens when none of them do exactly what you […]