Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Live Events

Blue Team Summit

Blue Team Summit

…spinning up infrastructure in AWS for the very first time. This course will demonstrate ideas like secure-by-default and will examine services and patterns for locking down defaults using a combination of open source and platform-native tooling. Register Now! Offense for Defense with Tim Medin Date: August 28-29, 2025  Time: 9…

Social Posts

Blog Posts

Getting Started in Blockchain Security and Smart Contract Auditing

Blockchain Security and Smart Contract Auditing

…of other issues that are still being found all the time. These are just some kind of. Just to throw at you today, just to show you, hey, here’s some of the things that are happening. And, here’s some of the issues. With that being said, functions that appear secure

Getting Started with Burp Suite & Webapp Pentesting

…have a class called modern web app pen testing, and we use burp in that class. We just had the last run. We did that with the, secure west Virginia last week, and we’re looking to get it up and running again sometime in the first quarter of next year….

Getting Started in Cyber Deception

…can run it on prem, you can run it off prem, it’s really up to you, but you’re going to want to go through and secure it. If you look in ADHD, there’s actually a, log in real quick. You have credentials and ADHD lists out all the default credentials…

Privacy Tips for the Non-Criminal – Part 1

…you’re like, oh, I would really like to figure out how I can get less data on the Internet. Here’s where you go. You check these books out last. We’re not going to go into detailed concepts of how to secure your devices. We might touch on some of it,…

Intro to Network Security Monitoring (NSM)

…we, we haven’t even announced this yet. We’re still getting a couple things together. But one thing is live for this, In December, on December 4th, we are doing a Secure Code Summit. So I just put a link in the chat for Zoom. So if you guys are interested,…

How To Use Threat Intelligence

How To Use Threat Intelligence

This webcast was originally published on April 16, 2018. In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks. The conversation also explores alternative strategies for utilizing…

5 Year Plan into InfoSec – Part 2

5 Year Plan into InfoSec – Part 2

…So, Randy, I want to throw it over to you because you don’t just have students that have projects, you have team projects that a lot of people are working together. Do you think that that creates a place for people that maybe don’t have any creative, super awesome ideas

How to Use Backdoors & Breaches to do Tabletop Exercises and Learn Cybersecurity

How to Play Backdoors & Breaches

…And I’m like, we could create a card game around this. And that’s really how this all started. And took, took a lot of those ideas from pivots and payloads, cubicles and compromises and rolled it into this game. And the core goal of the game was to try to…

Shopping Cart

No products in the cart.