Reading view
TrendForce: geheugenchips worden twee keer zo duur dit kwartaal
Kioxia en Sandisk gaan vijf jaar langer samenwerken door vraag naar AI-geheugen
'Samsung begint volgende maand met productie HBM4-geheugen voor Nvidia'
Biwin brengt 'extreem overklokbaar' DDR5-geheugen uit met snelheden tot 8000MT/s
Deceptive-Auditing: An Active Directory Honeypots Tool

Deceptive-Auditing is a tool that deploysΒ Active Directory honeypots and automatically enables auditing for those honeypots.
The post Deceptive-Auditing: An Active Directory Honeypots Tool appeared first on Black Hills Information Security, Inc..
GoSpoofΒ β Turning Attacks into IntelΒ

Imagine this: Youβre an attacker ready to get their hands on valuable data that you can sell to afford going on a sweet vacation. You do your research, your recon, everything, ensuring that thereβs no way this can go wrong. The day of the attack, you brew some coffee, crack your knuckles, and get started. A few hours into the service scan, you come to realize that all the network ports are open, but in use.
The post GoSpoofΒ β Turning Attacks into IntelΒ appeared first on Black Hills Information Security, Inc..
Satellite Hacking

by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched [β¦]
The post Satellite Hacking appeared first on Black Hills Information Security, Inc..
WifiForge β WiFi Exploitation for the Classroom

by William Oldert // BHIS Intern BHIS had a problem. Β We needed an environment for students to learn WiFi hacking safely. Our original solution used interconnected physical network gear [β¦]
The post WifiForge β WiFi Exploitation for the Classroom appeared first on Black Hills Information Security, Inc..