Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Social Posts

Pages

B2B Cybersecurity Training Default Image

B2B Cybersecurity Training

Equip your team with hands-on practical training using tools and techniques for success. Find Out How Government Confidentially assess your team’s needs, and develop a training program that holistically meets the objectives of your organization. Customize Your Training Secure Your Assets Business Safeguard your customer’s data and secure your daily…

Blog Posts

Atomic Red Team: Hands-On Getting Started Guide

…and you can find out a lot of great information about them. You have examples of groups that use these techniques and ideas, for how you can make this not a problem in your environment, maybe disable something, and it’s a lot of really valuable information. But one thing that…

Finding and Fixing AD CS Issues with Locksmith

…cat wants to be on screen today. standing up a web server that you control and slapping a web, server certificate on there so that way the traffic does look valid. Going to it and secure. You want, you want to create your own PowerShell scripts and sign those? Sure,…

The Anatomy of M365 Business Email Compromise

…user, as per the screenshot. End user says, well, yeah, mfa, we’re secure. Put in number, put in code, approve, deny, doesn’t matter, sms, sorry, all the same thing. This is a legitimate, effectively a legitimate MFA prompt. Evil Proxy then passes that back to M365. M365 says, you are…

Your Free and Open Source EDR Options

Your Free and Open Source EDR Options!

…okay, we’ve got to secure this. How are we actually going to secure this with the tools that we have at our disposal. And hopefully at the end of this webcast, you’re going to have some pretty solid tools that you can use in your environment to help lock things…

Networking for Pentesters Beginner – Part 1

Networking for Pentesters: Beginner – Part 1

…wanted to make this kind of gamified a bit so that there will be some entertainment along the way. Now, we’re going to start off with a scenario here. you’ve been hired, right? So you’ve been hired to hack into a network to secure a site before or to secure

Space Hacking for Beginners [Hardware Edition]

…also means of like hey, is our stuff secure? One of the things that I’m planning to do with my Cans app development is it’s very short flight but it’s like we want to see can we potentially hack it in that short flight. Is there something that we can…

Space Cybersecurity: Why It Matters & What You Can Do

Space Cybersecurity: Why It Matters & What You Can Do

…the space are free of back doors that they haven’t been tampered with, they, that they haven’t been altered in any kind of way. that it’s reliable. And then we also have to make sure that we just secure the satellite through the entire manufacturing, launch and deployment processes. What…

Windows logging, Sysmon, and ELK

Windows logging, Sysmon, and ELK

…own indexes, but they’re stealing information, or at least configs and ideas from these other platforms. It is also not necessarily for the faint of heart just to jump in and start doing it on your own. It really, really helps to have those water wings to kind of get…

Shopping Cart

No products in the cart.