❌

Reading view

Treating Antivirus as β€œThe Gold Standard”

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

The post Treating Antivirus as β€œThe Gold Standard” appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Sacred Cash Cow Tipping 2018

John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if […]

The post WEBCAST: Sacred Cash Cow Tipping 2018 appeared first on Black Hills Information Security, Inc..

  •  

Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment. Β The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel appeared first on Black Hills Information Security, Inc..

  •  

Bypassing Cylance: Part 2 – Using DNSCat2

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

  •  

Power Posing with PowerOPS

Brian FehrmanΒ // As described in my last blog post,Β Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AVΒ (sheeesh…it’s been a bit!), we are seeing more environments in […]

The post Power Posing with PowerOPS appeared first on Black Hills Information Security, Inc..

  •  
❌