Video: Bad As You Want To Be – Adversary Emulation Basics

Watch Now to Amp Up Your Red Team!
Video and Slide Deck from EH-Net Live! May 2020
OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up your organization’s capabilities to inc… Continue reading Video: Bad As You Want To Be – Adversary Emulation Basics

Webinar: Bad As You Want To Be – Adversary Emulation Basics

Register Now to Amp Up Your Red Team!
OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up to include threat hunting, RE and malware analysis. Your security program is at a pretty m… Continue reading Webinar: Bad As You Want To Be – Adversary Emulation Basics

Video: IoT Hacking 101 – Firmware Funhouse

Watch Now for a Virtual IoT Village
with a Hands-On Firmware Hacking Lab!
Video and Slide Deck from EH-Net Live! April 2020
Every device imaginable now has Internet access. IoT promises to bring supply chain efficiency, decreased maintenance downtime, … Continue reading Video: IoT Hacking 101 – Firmware Funhouse

Video: Deepfakes – A Technical Peek Behind the Curtain

Watch Now for the Technical Foundations of AI for Deepfakes!
Video and Slide Deck from EH-Net Live! March 2020
We’ve all seen deepfakes on the Interwebs… from funny videos to politics and, of course, from the impetus behind many technical i… Continue reading Video: Deepfakes – A Technical Peek Behind the Curtain

Webinar: Deepfakes – A Technical Peek Behind the Curtain

Register Now for the Technical Foundations of AI for Deepfakes!
We’ve all seen deepfakes on the Interwebs… from funny videos to politics and, of course, from the impetus behind many technical innovations, an insatiable appetite for porn. At her talk … Continue reading Webinar: Deepfakes – A Technical Peek Behind the Curtain

Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool

If your current capture process can’t keep up with the traffic and drops packets – you need a new capture process. No debates here. Analyzing a trace file in which you don’t have all the packets of interest will waste your time. You a… Continue reading Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool