Join us at the Blue Team Summit! Register Here

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Anti-Cast: Down with the CISO with Nathan Case

Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel Stay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com

Anti-Cast: XFS Forensics with xfs_db with Hal Pomeranz

Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t ...

Anti-Cast: Exploring PowerShell Logging with TellTail with Carrie Roberts

TellTail is a free and open source application that makes it easy to view and learn about PowerShell logging. In this webcast we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to ...

Anti-Cast: The Wrong Beer to the Barbecue – BYOVD Attacks with Alissa Torres

Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable!  Amazingly, some have CVEs dating back to 2015 or earlier. ...

Anti-Cast: API-ocalypse Now with Jennifer Shannon

Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting ...

Anti-Cast: Infiltrating Kubernetes – Attacker Motives and Methods with Cory Sabol

In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and ...

Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams

Everything old is new again, including intelligence analytic techniques. In today's webcast, Jake will introduce you to Kent's Analytic Doctrine, a formal intelligence analysis doctrine developed and refined in WWII. You don't need to be a CTI analyst to benefit from this webcast. Practically every ...

Shopping Cart

No products in the cart.