The defense supply chain is struggling with CMMC implementation, and itβs not because the requirements are inherently complex. The problem is misinformation, scope creep, and upstream contractors who donβt understand when CMMC actually applies. During our next webinar, our experts will cover the misunderstandings that are creating the most problems for contractors and subcontractors, from CUI marking confusion to unnecessary Level 2 requirements.
In this live session, we will cover:
- Understanding what CUI really means and when protection is actually required
- Distinguishing between ITAR, classified information, and legitimate CUI
- Identifying when CMMC Level 2 certification is truly necessary
- Managing upstream contractors who are overreaching with CMMC requirements
- Controlling scope creep in your compliance program
- Ensuring external service provider compliance without overcomplicating the process
Join us for an in-depth session with Director of Advisory Services Chris Camejo and Compliance Practice Lead Lee Quinton that addresses the real challenges youβre facing in your CMMC journey. Theyβll dig into the specific issues that are causing delays, increasing costs, and creating compliance headaches across the defense industry. Designed for contractors, subcontractors, and service providers, this webinar will provide practical, actionable guidance to navigate CMMC requirements effectively.
Get the clarity your CMMC program needs to succeed. Letβs tackle your CMMC questions together!
Webinar - CMMC Challenges and Misunderstandings
Originally from From TrustedSec: Webinar - CMMC Challenges and Misunderstandings ( :-{Δ±β #TrustedSec #Pentesting #cyberresearch
05.03.2026 12:28 β
π 0
π 0
π¬ 0
π 0
Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app
How to detect and respond to OAuth consent attacks in Google Workspace
Originally from Red Canary: Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app ( :-{Δ±β #threatintel #redcanary #cyberresearch
05.03.2026 10:23 β
π 0
π 0
π¬ 0
π 0
When AI can integrate across projects, systems, and security with a simple text, innovation stops being theoretical β it becomes reality. Watch the full episode "Ten Years: A Decade of Doing This" now! https://youtu.be/zlaWEVnu8Pg
Obviously, you have to call an AI "Jarvis" #ai #podcast
Originally from From TrustedSec: Obviously, you have to call an AI "Jarvis" #ai #podcast ( :-{Δ±β #TrustedSec #Pentesting #cyberresearch
04.03.2026 12:31 β
π 0
π 0
π¬ 0
π 0
π Register for FREE Infosec Webcasts, Anti-casts & Summits β
https://poweredbybhis.com
What if you could safely harness AI agents to automate real work, without spending a dime?Β
Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why theyβre not just for developers, and how to start for free.Β
Youβll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate.
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #π΄live-chat channel.
Learning to Trust AI Agents with Automation w/ Ethan and Derek
Originally from BHIS: Learning to Trust AI Agents with Automation w/ Ethan and Derek ( :-{Δ±β #BlackHillsInfoSec #cybersecurity #cyberresearch
04.03.2026 09:42 β
π 2
π 0
π¬ 0
π 0
Join us for our next Discord Livestream βAMA: Incident Responseβ on March 19 at 11:00am ET! Incident Response Practice Lead Ryan Macfarlane will field your questions on what TrustedSec is seeing on IR engagements, common attack vectors, as well as AI threats and how criminal and nation state actors are using it. Ryan is also willing to answer questions about his time as an FBI Cyber agent β questions about aliens will be considered on a case-by-case basis ;) Bring all your incident response questions and connect with our Discord community!
Discord Livestream - AMA: Incident Response
Originally from From TrustedSec: Discord Livestream - AMA: Incident Response ( :-{Δ±β #TrustedSec #Pentesting #cyberresearch
03.03.2026 12:33 β
π 1
π 0
π¬ 0
π 0
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT
Patrick Wheltle
How can job seekers research companies before applying?
In todayβs job market, it is easier than ever to share professional information with companies that may not be legitimate. This talk focuses on how job seekers can use basic research techniques to avoid wasting time or exposing sensitive details to organizations with no real intent to hire.
What is this presentation about?
This session explores a series of methods that can be used to research companies claiming to be hiring qualified applicants. The goal is to help professionals verify legitimacy before submitting resumes, portfolios, or personal data.
What role does OSINT play in job research?
Using open-source intelligence techniques, the talk demonstrates how publicly available information can reveal red flags about a companyβs operations, leadership, and credibility. Attendees will learn where to look and what questions to ask when evaluating a potential employer.
What case study is covered?
The presentation includes a real world case study of a company advertising roles with unusually high compensation. On the surface, the opportunity looked promising. However, basic OSINT research revealed deeper concerns.
What was uncovered during the investigation?
The company appeared to have no customers, no public reputation, and no verifiable business activity. Further research uncovered layers of shell companies and raised questions about whether the listed officers were even real individuals.
Why does this matter for job seekers?
Job scams and deceptive hiring practices can lead to identity theft, financial loss, or wasted effort. This session shows how a small amount of investigation can protect professionals from falling into these traps.
Who should watch this talk?
This campfire talk is ideal for job seekers, security professionals, recruiters, and anyone interested in OSINT or online investigation techniques.
What is the takeaway?
Sometimes the truth is hidden in plain sight. Knowing where to look can make all the difference.
Sign Up for WWHF
Register for this yearβs Wild West Hackin Fest here:
https://wildwesthackinfest.com/register/
Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills.
#cybersecurity #osint #jobsearch #careeradvice #infosec #onlinesafety #employmentscams #digitalinvestigations #cyberawareness
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) β Wild West Hackin' Fest: https://wildwesthackinfest.com/
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle
Originally from From WWHF: Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle ( :-{Δ±β #WWHF #BHIS #cyberresearch
03.03.2026 12:32 β
π 0
π 0
π¬ 0
π 0
Red Canary CFP tracker: March 2026
Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines
Originally from Red Canary: Red Canary CFP tracker: March 2026 ( :-{Δ±β #threatintel #redcanary #cyberresearch
03.03.2026 10:30 β
π 0
π 0
π¬ 0
π 0
Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy
By Assaf Morag, Cybersecurity Researcher Haute couture is presented as the most controlled, exclusive, and artisanal corner of the fashion industry. Invitation-only shows. One-of-one garments. Months of handwork. Astronomical prices. But when you step away from the runway narrative and look at couture as a system (materials, labor, knowledge, logistics, and incentives), a different picture [β¦]
The post Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy appeared first on Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime.
Originally from Flare: Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy ( :-{Δ±β #flare #CTI #cyberresearch
03.03.2026 09:29 β
π 0
π 0
π¬ 0
π 0
Ethics on the Line Balancing Social Engineering Success with Target Protection
Presenter: Jennifer Isacoff
Why do social engineering assessments raise ethical concerns?
Social engineering engagements like phishing and vishing are powerful tools for exposing weaknesses in an organizationβs defenses. They work by exploiting human trust. But what happens to the people who fall for them after the test is over?
What is this talk about?
This 15 minute campfire talk explores the ethical challenges of selling and conducting social engineering assessments without causing unintended harm to employees. Even when reports anonymize identities, basic security logs can often reveal who failed, sometimes leading to blame or punishment long after the engagement ends.
Why is this a problem for practitioners?
This creates a difficult question for social engineering professionals. How do you clearly demonstrate risk to a client while protecting the individuals being tested? The tension between accountability and education can undermine trust in both the assessment and the security team.
What ethical questions are discussed?
The session sparks an open discussion around whether mandatory post engagement training is the only ethical path forward, or if engagements can be designed to preserve anonymity while still delivering meaningful value to clients.
What real world experiences inform this talk?
Drawing from real world social engineering engagements, the discussion explores situations where proving impact, such as initial access or credential capture, conflicted with safeguarding individuals from negative consequences.
What solutions are on the table?
Expect a lively debate around practical approaches including creative contract language, log obfuscation strategies, client education, and engagement design choices that prioritize learning over punishment.
Who should attend?
This talk is for social engineering professionals, red teamers, defenders, and newcomers interested in the human side of security testing.
What is the goal of this session?
This is not just about ethics. It is about sustaining trust in the craft of social engineering while responsibly addressing the human factor that makes these attacks so effective.
Bring your stories, ideas, and opinions and letβs hash it out around the campfire.
Sign Up for WWHF
Register for this yearβs Wild West Hackin Fest here:
https://wildwesthackinfest.com/register/
Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills.
#cybersecurity #socialengineering #phishing #vishing #infosec #redteam #securityethics #humanfactor #defensivesecurity #cyberawareness
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) β Wild West Hackin' Fest: https://wildwesthackinfest.com/
Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff
Originally from From WWHF: Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff ( :-{Δ±β #WWHF #BHIS #cyberresearch
28.02.2026 12:41 β
π 0
π 0
π¬ 0
π 0
π Register for FREE Infosec Webcasts, Anti-casts & Summits β
https://poweredbybhis.com
How does PAM abuse fit into a realβworld attack chain?
Join us for a free oneβhour BHIS webinar with Ben Bowman as he introduces PAMSkeletonKey, a tool designed for red teamers and CTF players to explore persistence, lateral movement, and privilege escalation on Linux systems.
Ben will teach why the tool was created, how to use it safely in lab environments, and what this technique means for defenders working to detect or prevent authentication abuse.
You'll learn a practical understanding of Linux PAM (Pluggable Authentication Modules) authentication and how it can be abused to create a skeletonβkey backdoor for persistence.
Get started with PAMSkeletonKey: https://github.com/her3ticAVI/PAMSkeletonKey
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #π΄live-chat channel.
Intro to PAMSkeletonKey for Persistence w/ Ben Bowman
Originally from BHIS: Intro to PAMSkeletonKey for Persistence w/ Ben Bowman ( :-{Δ±β #BlackHillsInfoSec #cybersecurity #cyberresearch
28.02.2026 09:54 β
π 0
π 0
π¬ 0
π 0
We are getting a lot of requests for AI-generated Zoom video attacks! It's ramping up quick. Watch the full episode on LLM attacks now! https://youtu.be/QA_j4ZUYDAs
AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security
Originally from From TrustedSec: AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security ( :-{Δ±β #TrustedSec #Pentesting #cyberresearch
26.02.2026 12:48 β
π 0
π 0
π¬ 0
π 0
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
The protocol gap is real. Authentication proves identity once but remember that session protection must be continuous.
Originally from Red Canary: The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity ( :-{Δ±β #threatintel #redcanary #cyberresearch
26.02.2026 10:44 β
π 1
π 0
π¬ 0
π 0
π Register for FREE Infosec Webcasts, Anti-casts & Summits β
https://poweredbybhis.com
What if an attacker lived inside your network for seven months and your tools never noticed?
BHIS discovered a stealthy intrusion during a real breach assessment: attackers used a COM-based persistence technique hidden in Windows scheduled tasks, leaving no obvious indicators, suspicious processes, or malicious file hashes.
Just a quiet foothold designed to stay invisible.
Join BHIS SOC analyst Troy Wojewoda for a free one-hour session as he investigates a two-year-long attack campaign, revealing how the attacker stayed hidden, how the SOC uncovered the activity, and how you can spot similar techniques in your own environment.
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #π΄live-chat channel.
Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda
Originally from BHIS: Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda ( :-{Δ±β #BlackHillsInfoSec #cybersecurity #cyberresearch
26.02.2026 08:00 β
π 0
π 0
π¬ 0
π 0
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
How to observe, detect, investigate and mitigate against overly permissive Entra app consent
Originally from Red Canary: ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions ( :-{Δ±β #threatintel #redcanary #cyberresearch
25.02.2026 10:48 β
π 0
π 0
π¬ 0
π 0