Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Social Posts

Pages

B2B Cybersecurity Training Default Image

B2B Cybersecurity Training

Equip your team with hands-on practical training using tools and techniques for success. Find Out How Government Confidentially assess your team’s needs, and develop a training program that holistically meets the objectives of your organization. Customize Your Training Secure Your Assets Business Safeguard your customer’s data and secure your daily…

Blog Posts

Incident Case Study for SMB Response Teams

…falling all over itself. And it was like corrupting data all the time. So it’s terrible. And just another example of a piece of secure piece of software in general. that’s Complicated, unintuitive, little to no documentation of how to work it or set it up and just given to…

How to Bypass Modern Phishing Techniques

How to Bypass Modern Phishing Detections

…well, how did we defend against this type of attack? And so, some advice I have on the defense. There are obviously two different areas where we need to defend. We need to secure the humans, and we do that through the security awareness training, and we need to secure

Your 5 Year Path Success in InfoSec

Your 5 Year Path: Success in InfoSec

…value of practical experience and the opportunity to learn from mistakes in a secure environment. The importance of scripting and programming in security careers is underscored, with Python and Bash being recommended as essential skills. Full Video https://youtu.be/Uv-AfK7PkxU?si=Rcd_SPqnHYcA25V- Transcript John I’m sorry. I sound like a smoker. Everybody, as we…

Linux Command Line Dojo

…There is a secure delete command called shred. Shred overwrites the file content with random data before removing the file. Shred u means overwrite and then unlink the file. It’s like the secure delete version of rm. and if people use shred to delete their files, eh, it makes my…

Atomic Red Team: Hands-On Getting Started Guide

…and you can find out a lot of great information about them. You have examples of groups that use these techniques and ideas, for how you can make this not a problem in your environment, maybe disable something, and it’s a lot of really valuable information. But one thing that…

Finding and Fixing AD CS Issues with Locksmith

…cat wants to be on screen today. standing up a web server that you control and slapping a web, server certificate on there so that way the traffic does look valid. Going to it and secure. You want, you want to create your own PowerShell scripts and sign those? Sure,…

The Anatomy of M365 Business Email Compromise

…user, as per the screenshot. End user says, well, yeah, mfa, we’re secure. Put in number, put in code, approve, deny, doesn’t matter, sms, sorry, all the same thing. This is a legitimate, effectively a legitimate MFA prompt. Evil Proxy then passes that back to M365. M365 says, you are…

Shopping Cart

No products in the cart.