โŒ

Normal view

Malware Analysis: How to Analyze and Understand Malware

By: BHIS
25 February 2026 at 15:00

Malware analysis is an amazing field that can be interesting, fun, and useful for your cybersecurity career. If youโ€™re wondering WHY anyone would want to dig into malware, itโ€™s all for a better understanding of cybersecurity!

The post Malware Analysis: How to Analyze and Understand Malware appeared first on Black Hills Information Security, Inc..

When the SOC Goes to Deadwood: A Night to Rememberย 

By: BHIS
4 February 2026 at 15:00

Hear a tale about the time the BHIS SOC team conducted a 14-hour overnight incident response... from the Wild West Hackin' Fest conference in Deadwood, South Dakota.

The post When the SOC Goes to Deadwood: A Night to Rememberย  appeared first on Black Hills Information Security, Inc..

Common Cyber Threats

By: BHIS
21 January 2026 at 15:00

In todayโ€™s interconnected digital world, information security has become a critical concern for individuals, businesses, and governments alike. Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data.

The post Common Cyber Threats appeared first on Black Hills Information Security, Inc..

How to Perform and Combat Social Engineering

By: BHIS
23 August 2024 at 05:00

This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical copy on the Spearphish General Store. [โ€ฆ]

The post How to Perform and Combat Social Engineering appeared first on Black Hills Information Security, Inc..

The Curious Case of theย Comburglar

By: BHIS
18 December 2025 at 18:55

By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the clientโ€™s [โ€ฆ]

The post The Curious Case of theย Comburglar appeared first on Black Hills Information Security, Inc..

Inside the BHIS SOC: A Conversation with Hayden Covingtonย 

By: BHIS
3 December 2025 at 15:00

What happens when you ditch the tiered ticket queues and replace them withย collaboration, agility, and real-time response? In this interview, Hayden Covington takes us behind the scenes of the BHIS Security Operations Center, which isย where analystsย donโ€™tย escalateย tickets,ย they solve them.

The post Inside the BHIS SOC: A Conversation with Hayden Covingtonย  appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation

By: BHIS
26 November 2025 at 15:00

This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.

The post Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation appeared first on Black Hills Information Security, Inc..

Why You Got Hacked โ€“ 2025 Super Edition

By: BHIS
19 November 2025 at 18:50

This article was written to provide readers with an overview of a selection of our pentest results from the last 15 months. This data was gathered toward the end of September 2025. Shockingly, the data does not differ much from our prior analyses conducted at the end of 2022 or 2023.

The post Why You Got Hacked โ€“ 2025 Super Edition appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 2): Constrained Delegation

By: BHIS
12 November 2025 at 15:00

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.

The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 1): Unconstrained Delegation

By: BHIS
5 November 2025 at 15:00

In Active Directory exploitation, Kerberos delegation is easily among my top favorite vectors of abuse, and in the years Iโ€™ve been learning Kerberos exploitation, Iโ€™ve noticed that Impacket doesnโ€™t get nearly as much coverage as tools like Rubeus or Mimikatz.

The post Abusing Delegation with Impacket (Part 1): Unconstrained Delegation appeared first on Black Hills Information Security, Inc..

GoSpoofย โ€“ Turning Attacks into Intelย 

By: BHIS
29 October 2025 at 15:00

Imagine this: Youโ€™re an attacker ready to get their hands on valuable data that you can sell to afford going on a sweet vacation. You do your research, your recon, everything, ensuring that thereโ€™s no way this can go wrong. The day of the attack, you brew some coffee, crack your knuckles, and get started. A few hours into the service scan, you come to realize that all the network ports are open, but in use.

The post GoSpoofย โ€“ Turning Attacks into Intelย  appeared first on Black Hills Information Security, Inc..

Model Context Protocol (MCP)

By: BHIS
22 October 2025 at 16:00

The Model Context Protocol (MCP) is a proposed open standard that provides a two-way connection for AI-LLM applications to interact directly with external data sources. It is developed by Anthropic and aims to simplify AI integrations by reducing the need for custom code for each new system.

The post Model Context Protocol (MCP) appeared first on Black Hills Information Security, Inc..

Bypassing WAFs Using Oversized Requests

By: BHIS
15 October 2025 at 16:00

Many web application firewalls (WAFs) can be bypassed by simply sending large amounts of extra data in the request body along with your payload. Most WAFs will only process requests up to a certain size limit. How the WAF is configured to handle these large requests determines exploitability, but some common WAFs will allow it by default.

The post Bypassing WAFs Using Oversized Requests appeared first on Black Hills Information Security, Inc..

โŒ