Black Hills Information Security

12.6K posts

Black Hills Information Security banner
Black Hills Information Security

Black Hills Information Security

@BHinfoSecurity

Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.

Katılım Mayıs 2013
2.4K Takip Edilen49.2K Takipçiler
Black Hills Information Security
**NEW** BHIS | Blog Take a look at this real-world account of how insecure databases and an AI chatbot left customer data exposed and the lessons that organizations, and those that defend them, can learn from it. Lessons From A Chatbot Incident: When AI Becomes a Data Liability by: Jeremiah Fowler Published: 03/25/2026 Learn more: blackhillsinfosec.com/lessons-from-a…
English
0
3
3
781
Black Hills Information Security
Let's look at what's happening with Antisyphon Training and Black Hills Information Security! SOC Summit 2026 March 25, 2026 10:00 AM EDT Register: antisyphontraining.com/event/soc-summ… Security Operations Centers are where defenders grow, pressure is real, and impact matters. Take your knowledge further with the special live training - #summit-training" target="_blank" rel="nofollow noopener">antisyphontraining.com/event/soc-summ… BHIS: The next BHIS webcast is on Learning to Trust AI Agents with Automation w/ Ethan Robish and Derek Banks March 26, 2026 1:00 PM EDT Register: events.zoom.us/ev/Ajoipjn-LK3…
Black Hills Information Security tweet mediaBlack Hills Information Security tweet media
English
0
3
5
962
Black Hills Information Security retweetledi
LimaCharlie
LimaCharlie@limacharlieio·
Custom detection rules mean nothing if you're not validating them continuously. Our Atomic Red Team module is built into the platform and documented publicly, no hidden features, no black box. For John Strand, Owner of @BHinfoSecurity, that level of transparency was the deciding factor. The BHIS SOC treats validation as an ongoing practice, not a one-time check. They run a lot of custom rules and need to know those rules are firing properly on a continuous basis, not just at the next pen test or the next incident. Having Atomic Red Team built directly into the platform makes that possible. Since making the switch, BHIS can now handle roughly twice the customer load with the same staff. Watch the full interview: lc.pub/3NmSIIz #cybersecurity #infosec #mssp
English
1
3
11
1.5K
Black Hills Information Security
Post-incident lessons are very valuable—and often very, very expensive! Patterson C. joined us last week to show us we don’t have to wait to make meaningful improvements by giving us a Pre-Incident Checklist. 10 low-effort, high-impact lessons every business should review and fix before a cybersecurity incident! Watch the full webcast & find the slidedeck here: youtube.com/live/jYaMkv56x…
YouTube video
YouTube
Black Hills Information Security tweet media
English
0
3
22
1.6K
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
"Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data." Read more: blackhillsinfosec.com/common-cyber-t… Common Cyber Threats by: Dieter Smith, Wade Wells, Blake Regan, & Matthew Thomas Published (in blog format): 1/21/2025
Black Hills Information Security tweet media
English
0
2
9
976
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
If I told you there was a digital forensics and IR platform that gives security teams deep visibility into Windows, macOS, and Linux endpoints, would you believe me? What if I said it’s open source, lightweight, scalable, and designed for flexible investigations? Welcome to Velociraptor 101! Download Rapid7's Velociraptor DFIR - github.com/Velocidex/velo… Velociraptor 101: Rapid Windows Endpoint Investigations with Velociraptor & KAPE - youtube.com/watch?v=rqEjxZ… AASLR: Playing with Velociraptor! - youtube.com/watch?v=sLSaYH…
YouTube video
YouTube
YouTube video
YouTube
Black Hills Information Security tweet mediaBlack Hills Information Security tweet media
English
4
70
387
21.4K
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
Wise words from our intern @strandjs
LimaCharlie@limacharlieio

Running a multi-tool SOC as an MSSP means constantly solving for integration. Every best-of-breed product your team trusts has to communicate, correlate, and feed into a single view of the customer environment. For @BHinfoSecurity, that centralized layer is LimaCharlie. LimaCharlie pulls telemetry from across their stack and, for BHIS, the integration experience has been a dream. Since making the switch, BHIS cut their cost per endpoint by more than half and can now handle roughly twice the customer load with the same staff. Watch the full interview: lc.pub/4doQUsU #cybersecurity #infosec #soc #mssp

English
0
3
17
4.1K
Black Hills Information Security retweetledi
LimaCharlie
LimaCharlie@limacharlieio·
Running a multi-tool SOC as an MSSP means constantly solving for integration. Every best-of-breed product your team trusts has to communicate, correlate, and feed into a single view of the customer environment. For @BHinfoSecurity, that centralized layer is LimaCharlie. LimaCharlie pulls telemetry from across their stack and, for BHIS, the integration experience has been a dream. Since making the switch, BHIS cut their cost per endpoint by more than half and can now handle roughly twice the customer load with the same staff. Watch the full interview: lc.pub/4doQUsU #cybersecurity #infosec #soc #mssp
English
0
2
18
5K
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
Hey folks! Let's look at what's happening with @Antisy_Training Black Hills Information Security! Anti-Cast: The next Anti-Cast is on Securing the Cloud in the Age of AI with Andrew Krug March 18 @ 12:00 pm – 1:00 pm EDT Register: antisyphontraining.com/event/anti-cas… BHIS: “The next BHIS webcast is on Do it, do it NOW! - A Pre-Incident Checklist w/ Patterson March 19, 2026 1:00 PM EDT Register: events.zoom.us/ev/ApfsWW2Dn3n… Post-incident “lessons learned” are extremely valuable and very, very expensive! But you don’t have to wait until “right of boom” to make meaningful improvements to your cybersecurity resilience! Join us for a free one-hour webcast with Patterson Cake from Black Hills Information Security: Do it, do it NOW!! A Pre-Incident Checklist. You’ll learn the top 10 low-effort, high-impact lessons every business should review and fix before a cybersecurity incident. SOC Summit: March 25 @ 10:00 am – 4:00 pm EDT Register: antisyphontraining.com/event/soc-summ… Live Training March 26 – April 10 #summit-training" target="_blank" rel="nofollow noopener">antisyphontraining.com/event/soc-summ…
Black Hills Information Security tweet mediaBlack Hills Information Security tweet mediaBlack Hills Information Security tweet media
English
0
0
8
754
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
"[...] as we move into 2026, I’ve written down some of my biggest insights on how to gather bids, determine the quality of testing firms, and get the best pricing for your engagement." Read more: blackhillsinfosec.com/finding-the-ri… Finding the Right Penetration Testing Company By: Melisa Wachs Published: 01/14/2026
Black Hills Information Security tweet media
English
0
1
4
1K
Black Hills Information Security retweetledi
Antisyphon Training
Antisyphon Training@Antisy_Training·
Teams that lack incident command structure often stumble when a real breach occurs. Don’t leave your response to chance. Develop leadership skills that help you take control, maintain clarity, and direct effective action with Gerard in this class. antisyphontraining.com/product/cybers…
Antisyphon Training tweet media
English
0
2
5
930
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
**NEW** BHIS | Blog Learn what GRC really is, how risk is measured and managed, and how to start a career driving security strategy and outcomes. Understanding GRC: How to Navigate Risks and Compliance Standards by: Sean Reilly Published: 03/11/2026 Learn more: blackhillsinfosec.com/understanding-…
Black Hills Information Security tweet media
English
1
7
17
1.4K
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
"All together, this tool allows domain admins to set up deceptive traps in their Active Directory environment, baiting adversaries into revealing themselves." Read more: blackhillsinfosec.com/deceptive-audi… Deceptive-Auditing: An Active Directory Honeypots Tool By: Sean Minnick Published: 1/7/2026
Black Hills Information Security tweet media
English
0
3
25
1.5K
Black Hills Information Security retweetledi
Antisyphon Training
Antisyphon Training@Antisy_Training·
Shoutout to the folks who break into systems for the right reasons and then write a 12-page report about it. We see you. You’re awesome!
Antisyphon Training tweet media
English
0
2
6
813