Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Social Posts

Pages

Terms of Service Default Image

Terms of Service

…claims, concerns, or questions regarding third-party products should be directed to the third party. SECTION 9 – USER COMMENTS, FEEDBACK AND OTHER SUBMISSIONS If, at our request, you send certain specific submissions (for example contest entries) or without a request from us you send creative ideas, suggestions, proposals, plans, or…

Blog Posts

Your Free and Open Source EDR Options

Your Free and Open Source EDR Options!

…okay, we’ve got to secure this. How are we actually going to secure this with the tools that we have at our disposal. And hopefully at the end of this webcast, you’re going to have some pretty solid tools that you can use in your environment to help lock things…

Networking for Pentesters Beginner – Part 1

Networking for Pentesters: Beginner – Part 1

…wanted to make this kind of gamified a bit so that there will be some entertainment along the way. Now, we’re going to start off with a scenario here. you’ve been hired, right? So you’ve been hired to hack into a network to secure a site before or to secure

Space Hacking for Beginners [Hardware Edition]

…also means of like hey, is our stuff secure? One of the things that I’m planning to do with my Cans app development is it’s very short flight but it’s like we want to see can we potentially hack it in that short flight. Is there something that we can…

Space Cybersecurity: Why It Matters & What You Can Do

Space Cybersecurity: Why It Matters & What You Can Do

…the space are free of back doors that they haven’t been tampered with, they, that they haven’t been altered in any kind of way. that it’s reliable. And then we also have to make sure that we just secure the satellite through the entire manufacturing, launch and deployment processes. What…

Windows logging, Sysmon, and ELK

Windows logging, Sysmon, and ELK

…own indexes, but they’re stealing information, or at least configs and ideas from these other platforms. It is also not necessarily for the faint of heart just to jump in and start doing it on your own. It really, really helps to have those water wings to kind of get…

OPSEC Fundamentals for Remote Red Teams

This webcast was originally published on March 23, 2021 In this video, Michael Allen discusses operational security fundamentals for remote red teams. He delves into the importance of maintaining secrecy in red team operations and the potential risks of exposure. Allen provides practical insights on how to effectively secure red…

AI in InfoSec? Well, Let’s Talk About It

…summary. The speaker discusses techniques, challenges and tools and open source intelligence, OSN and related fields emphasizing critical thinking, private privacy biases involving digital landscapes. That sounds really interesting. I should probably read that or watch that talk goes into the overall ideas and then gives me some insights quotes,…

The Realities of SOC Work

The Realities of SOC Work

…also taking advantage of AI and automation in your various SOCs. And I have. I’ve been hearing this a lot. Daniel Lowrie A lot of people asking this question. How can we integrate AI? Is it secure? Can we do that securely? Will it be seamless? There’s, like, a lot…

Shopping Cart

No products in the cart.