www.reuters.com/world/china/...
www.reuters.com/world/china/...
We’ve refreshed the BC Security website and introduced SIMAPTIC, our continuous threat-exposure and validation platform that simulates multi-stage attacks and provides teams with real signals they can act on.
simaptic.ai
Also, check out the new website!
bcsecurity.io
We’ve refreshed the BC Security website and introduced SIMAPTIC, our continuous threat-exposure and validation platform that simulates multi-stage attacks and provides teams with real signals they can act on.
simaptic.ai
Also, check out the new website!
bcsecurity.io
As the year winds down, we just want to say thanks to our clients, partners, and the awesome community around us. Your support means everything, and it’s what keeps us building, learning, and doing what we love.
Thank you to everyone!
As the year winds down, we just want to say thanks to our clients, partners, and the awesome community around us. Your support means everything, and it’s what keeps us building, learning, and doing what we love.
Thank you to everyone!
Bringing major upgrades like Starkiller v3.2.0, mTLS support, ChaCha20-Poly1305 encryption, expanded PSExec agent options, and flexible env-based configuration — making Empire more secure and operator-friendly than ever.
github.com/BC-SECURITY/...
Bringing major upgrades like Starkiller v3.2.0, mTLS support, ChaCha20-Poly1305 encryption, expanded PSExec agent options, and flexible env-based configuration — making Empire more secure and operator-friendly than ever.
github.com/BC-SECURITY/...
• mTLS agents & listeners
• ChaCha20-Poly1305 encryption + DH key exchange
• HTTPS host reuse across HTTP & malleable listeners
• Customizable C# obfuscation via EmpireCompiler
• Major dependency upgrades & stability fixes
github.com/BC-SECURITY/...
• mTLS agents & listeners
• ChaCha20-Poly1305 encryption + DH key exchange
• HTTPS host reuse across HTTP & malleable listeners
• Customizable C# obfuscation via EmpireCompiler
• Major dependency upgrades & stability fixes
github.com/BC-SECURITY/...
One of our flagship cyber courses is going on sale, for a limited time.
If you’ve been waiting to jump into hands-on, operator-level training, now’s your moment.
training.bc-security.org/courses/empi...
One of our flagship cyber courses is going on sale, for a limited time.
If you’ve been waiting to jump into hands-on, operator-level training, now’s your moment.
training.bc-security.org/courses/empi...
Cyber Tip: Segment your administrative network and separate privileged access.
Keep domain controllers, jump servers, and management systems separate from user workstations.
Isolation limits lateral movement and protects privileged credentials.
Cyber Tip: Segment your administrative network and separate privileged access.
Keep domain controllers, jump servers, and management systems separate from user workstations.
Isolation limits lateral movement and protects privileged credentials.
Cyber Tip: Patch your third-party software.
Attackers don’t always need zero-days, just an old plug-in or unpatched tool.
Centralize patching, remove legacy apps, and stay current.
Every unpatched tool is a potential entry point.
Cyber Tip: Patch your third-party software.
Attackers don’t always need zero-days, just an old plug-in or unpatched tool.
Centralize patching, remove legacy apps, and stay current.
Every unpatched tool is a potential entry point.
Cyber Tip: Rotate service account passwords often. These high-privilege accounts are prime targets for attackers. Regular rotation limits damage and reduces risk.
Cyber Tip: Rotate service account passwords often. These high-privilege accounts are prime targets for attackers. Regular rotation limits damage and reduces risk.
Cyber Tip: Microsoft has officially ended support for Windows 10. Without ongoing security updates, these systems are now vulnerable to new exploits and malware. If you’re still running Windows 10, upgrade as soon as possible to stay secure and compliant.
Cyber Tip: Microsoft has officially ended support for Windows 10. Without ongoing security updates, these systems are now vulnerable to new exploits and malware. If you’re still running Windows 10, upgrade as soon as possible to stay secure and compliant.
Cyber Tip: Close what you don’t use. Unused ports and services expand your attack surface and invite scanning or exploitation. Disabling them keeps your network lean, secure, and harder to breach.
#Cyberaware #CybersecurityAwarenessMonth #Cybersecurity
Cyber Tip: Close what you don’t use. Unused ports and services expand your attack surface and invite scanning or exploitation. Disabling them keeps your network lean, secure, and harder to breach.
#Cyberaware #CybersecurityAwarenessMonth #Cybersecurity
Cyber Tip: Keep an eye on outbound traffic. Attackers often use it to exfiltrate data or maintain control of compromised systems. Reviewing outbound connections helps you detect and contain threats before sensitive data leaves your network.
Cyber Tip: Keep an eye on outbound traffic. Attackers often use it to exfiltrate data or maintain control of compromised systems. Reviewing outbound connections helps you detect and contain threats before sensitive data leaves your network.
Cyber Tip: Review your PowerShell logs regularly. Attackers often abuse built-in tools like PowerShell to run commands, move laterally, and hide activity. Detailed logging helps spot unusual scripts or commands that may signal an intrusion before it spreads.
Cyber Tip: Review your PowerShell logs regularly. Attackers often abuse built-in tools like PowerShell to run commands, move laterally, and hide activity. Detailed logging helps spot unusual scripts or commands that may signal an intrusion before it spreads.
Cyber Tip: Check file hashes before installing or running downloads. Verifying the SHA256 or MD5 ensures the file hasn’t been tampered with and matches the official source. This quick step helps prevent malware from slipping in through fake or modified installers.
Cyber Tip: Check file hashes before installing or running downloads. Verifying the SHA256 or MD5 ensures the file hasn’t been tampered with and matches the official source. This quick step helps prevent malware from slipping in through fake or modified installers.
Cyber Tip: Use DNS filtering to block malicious domains before they reach your network. Even if someone clicks a bad link, DNS filters can stop the connection, prevent data theft, and reduce overall risk.
#Cybersecurity
Cyber Tip: Use DNS filtering to block malicious domains before they reach your network. Even if someone clicks a bad link, DNS filters can stop the connection, prevent data theft, and reduce overall risk.
#Cybersecurity
Cyber Tip: Never enable macros on documents from unknown or untrusted sources. Attackers often send Word/Excel files that trick you into clicking “Enable Content” to launch malware. If you weren’t expecting the file, don’t trust it.
Cyber Tip: Never enable macros on documents from unknown or untrusted sources. Attackers often send Word/Excel files that trick you into clicking “Enable Content” to launch malware. If you weren’t expecting the file, don’t trust it.
We believe awareness is the first line of defense. This month, we’ll share tips and insights from our experts to help protect what matters most.
Tip: Scammers use urgent language to create panic. Don’t rush, pause & verify before acting.
We believe awareness is the first line of defense. This month, we’ll share tips and insights from our experts to help protect what matters most.
Tip: Scammers use urgent language to create panic. Don’t rush, pause & verify before acting.
youtu.be/IFy_96Dg__E?...
#Phishing #SecurityAwareness #Infosec
youtu.be/IFy_96Dg__E?...
#Phishing #SecurityAwareness #Infosec
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
Our analyst Andrew, discovered unauthenticated access to thousands of files and faced roadblocks trying to report it. His blog breaks down what happened and why design flaws matter as much as exploits.
bc-security.org/when-intende...
Our analyst Andrew, discovered unauthenticated access to thousands of files and faced roadblocks trying to report it. His blog breaks down what happened and why design flaws matter as much as exploits.
bc-security.org/when-intende...
training.bc-security.org/courses/empi...
#Cybersecurity #RedTeam
training.bc-security.org/courses/empi...
#Cybersecurity #RedTeam
Jake Krasnov (BC Security) is hosting a LIVE AMA on r/SolarDIY at 12 PM ET — only a few hours from now!
Bring your cyber questions here: reddit.com/r/SolarDIY
Jake Krasnov (BC Security) is hosting a LIVE AMA on r/SolarDIY at 12 PM ET — only a few hours from now!
Bring your cyber questions here: reddit.com/r/SolarDIY