Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blackhillsinfosec.com

Black Hills Information Security

Get the latest updates from Black Hills Information Security directly as they happen.

Follow now 73 followers

Latest posts

Last updated 2 days ago

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 1: Burpference

2 days ago

Artificial Intelligence (AI) has been a hot topic in information technology and...

Using a Proxy for Mobile Applications That Are System Proxy Unaware

9 days ago

This is a foolproof guide to intercepting traffic from mobile applications built...

How to Root Android Phones

16 days ago

This blog will cover how to root an AVD emulator and a...

Communicating Security to the C-Suite: A Strategic Approach

23 days ago

Engaging with the C-suite is not just about addressing security concerns or...

Offline Memory Forensics With Volatility

about 1 month ago

Volatility is a memory forensics tool that can pull SAM hashes from...

Getting Started with AI Hacking: Part 1

about 1 month ago

You may have read some of our previous blog posts on Artificial...

Go-Spoof: A Tool for Cyber Deception

about 1 month ago

Go-Spoof brings an old tool to a new language. The Golang rewrite...

How to Test Adversary-in-the-Middle Without Hacking Tools

about 2 months ago

In this video, Michael Allen discusses how to test Adversary-in-the-Middle attacks without...

Canary in the Code: Alert()-ing on XSS Exploits

about 2 months ago

I’ve been a web application pentester for a while now and over...

How to Hack Wi-Fi with No Wi-Fi

about 2 months ago

In this video, John Strand and his team discuss the challenges of...

Introducing Orbit

about 2 months ago

When I set out to build Orbit, I knew that the interface...

Why Your Org Needs a Penetration Test Program

about 2 months ago

This webcast originally aired on February 27, 2025. Join us for a...