Introducing Orbit 
Black Hills Information Security Blog
by BHIS
20h ago
When I set out to build Orbit, I knew that the interface had to be intuitive and accessible, but more importantly, the application had to solve a real problem. And here’s the challenge we faced... The post Introducing Orbit  appeared first on Black Hills Information Security ..read more
Visit website
Why Your Org Needs a Penetration Test Program
Black Hills Information Security Blog
by BHIS
20h ago
This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […] The post Why Your Org Needs a Penetration Test Program appeared first on Black Hills Information Security ..read more
Visit website
Burp Suite Extension: Copy For 
Black Hills Information Security Blog
by BHIS
1w ago
If you’ve ever had to take a request from Burp and turn it into a command line, especially for jwt_tool.py, you know it can be painful—but no more! The “Copy For” extension is here to save valuable time.  The post Burp Suite Extension: Copy For  appeared first on Black Hills Information Security ..read more
Visit website
Light at the End of the Dark Web
Black Hills Information Security Blog
by BHIS
1w ago
Join us for this one-hour Black Hills Information Security webcast with Joseph - Security Analyst, as he shares with you what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself. The post Light at the End of the Dark Web appeared first on Black Hills Information Security ..read more
Visit website
Wi-Fi Forge: Practice Wi-Fi Security Without Hardware 
Black Hills Information Security Blog
by BHIS
2w ago
In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […] The post Wi-Fi Forge: Practice Wi-Fi Security Without Hardware  appeared first on Black Hills Information Security ..read more
Visit website
Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain
Black Hills Information Security Blog
by BHIS
2w ago
RAG connects pre-trained LLMs with current data sources. Moreover, a RAG system can use many data sources. The post Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain appeared first on Black Hills Information Security ..read more
Visit website
Gone Phishing: Installing GoPhish and Creating a Campaign
Black Hills Information Security Blog
by BHIS
3w ago
GoPhish provides a nice platform for creating and running phishing campaigns. This blog will guide you through installing GoPhish and creating a campaign.  The post Gone Phishing: Installing GoPhish and Creating a Campaign appeared first on Black Hills Information Security ..read more
Visit website
5 Things We Are Going to Continue to Ignore in 2025
Black Hills Information Security Blog
by BHIS
1M ago
In this video, John Strand discusses the complexities and challenges of penetration testing, emphasizing that it goes beyond just finding and exploiting vulnerabilities. The post 5 Things We Are Going to Continue to Ignore in 2025 appeared first on Black Hills Information Security ..read more
Visit website
John Strand’s 5 Phase Plan For Starting in Computer Security
Black Hills Information Security Blog
by BHIS
1M ago
This article was originally published in the SOC Issue of our PROMPT# zine, which you can read for free HERE. The information was adapted from the 2018 webcast “John Strand’s […] The post John Strand’s 5 Phase Plan For Starting in Computer Security appeared first on Black Hills Information Security ..read more
Visit website
Introducing ORBIT, Scan Targets and Clients at Scale
Black Hills Information Security Blog
by BHIS
1M ago
This webcast originally aired on January 23, 2025. In this video, Ralph May discusses Orbit, a tool he developed for enhanced vulnerability scanning and continuous pen testing. The video delves […] The post Introducing ORBIT, Scan Targets and Clients at Scale appeared first on Black Hills Information Security ..read more
Visit website

Follow Black Hills Information Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR