❌

Reading view

Getting Started With AppLocker

John Strand // I have quite a few calls with customers who do not know where to begin when it comes to application whitelisting. Often, the approach some organizations take […]

The post Getting Started With AppLocker appeared first on Black Hills Information Security, Inc..

  •  

Getting Started With Sysmon

John Strand // In this blog, I want to walk through how we can set up Sysmon to easily get improved logging over what we get from normal (and just […]

The post Getting Started With Sysmon appeared first on Black Hills Information Security, Inc..

  •  

BHIS Webcast: Tracking Attackers. Why Attribution Matters and How To Do It.

In this BHISΒ webcast,Β we cover some new techniques and tactics on how to track attackers via various honey tokens.Β  We cover how to track with Word Web Bugs in ADHD and […]

The post BHIS Webcast: Tracking Attackers. Why Attribution Matters and How To Do It. appeared first on Black Hills Information Security, Inc..

  •  

Debating the Active Defense Law.. Because Arguing is Fun

John Strand // I wanted to take a few moments and address the β€œHacking Back” law that is working people up. There is a tremendously well-founded fear that this law […]

The post Debating the Active Defense Law.. Because Arguing is Fun appeared first on Black Hills Information Security, Inc..

  •  
  •  

Bugging Microsoft Files: Part 1 – Docx Files using Microsoft Word

Ethan Robish // If you’re familiar with ADHD and Web Word Bugs, you likely already know the method to create web tracking software using .html files renamed as .doc files. […]

The post Bugging Microsoft Files: Part 1 – Docx Files using Microsoft Word appeared first on Black Hills Information Security, Inc..

  •  
❌