BHinfoSecurity Profile Banner
Black Hills Information Security Profile
Black Hills Information Security

@BHinfoSecurity

Followers
48K
Following
11K
Media
3K
Statuses
12K

Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.

Joined May 2013
Don't wanna be here? Send us removal request.
@BHinfoSecurity
Black Hills Information Security
6 years
BHIS | #InfoSec Webcast - Available Now!. Your 5 Year Plan into InfoSec.w/ @strandjs. Recorded: 8/9/2017. Watch:
Tweet media one
13
52
310
@BHinfoSecurity
Black Hills Information Security
2 days
BACKDOORS & BREACHES - CARD OF THE DAY.Have you experienced this?.Deck: Cloud Deck.Attack/Procedure Type: Initial Compromise.Attack/Procedure: Credentials Posted Publicly in a Code Repository. Tools:.Gitleaks - TruffleHog - Gitrob -
Tweet media one
1
5
12
@grok
Grok
5 days
Join millions who have switched to Grok.
203
407
3K
@BHinfoSecurity
Black Hills Information Security
3 days
"Why use a text expander? While some of our work might become automated using LLMs, a lot of grunt work will never die.".Read more: Espanso: Text Replacement, the Easy Way.by: Sullo.Published: 5/28/2025
Tweet media one
0
0
1
@BHinfoSecurity
Black Hills Information Security
4 days
Do you think LLMs will eventually replace us, even at complex task? Check out Brian thoughts on the subject. AI-security researcher and BHIS pentester Brian Fehrman will be joining us for a free one-hour session with on defeating AI malware detection with AI. Learn how to
1
2
7
@BHinfoSecurity
Black Hills Information Security
4 days
If you are attending The Blue Team Summit we would love to hear about your experience! Take some time to fill out a quick survey! . Your answers will help us when creating webcast, summits & workshops. Your participation is always voluntary. Thank you --
Tweet media one
0
0
3
@BHinfoSecurity
Black Hills Information Security
5 days
**NEW** BHIS | Blog.Are we spending too much time guarding the gates and not enough watching what happens inside the walls?. Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security.by: @HobbsDale.Published: 8/27/2025.Learn more:
Tweet media one
1
4
11
@BHinfoSecurity
Black Hills Information Security
5 days
"One of the example prompts is to supply the chatbot with JavaScript source and have it analyze the code from a security perspective.".Read more: Arcanum Cyber Security Bot.by: Craig Vincent.Published: 6/25/2025
Tweet media one
0
2
5
@BHinfoSecurity
Black Hills Information Security
5 days
Do you think AI needs adult supervision? . Here's Bronwens stance. What do you think? Discuss in the comments below.
0
0
3
@BHinfoSecurity
Black Hills Information Security
5 days
Get an inside look at what an ANTISOC operation looks like with Corey Ham!. You can order your copy of the ANTISOC issue here -- Unfortunately if you receive a 404 error code that means we currently can't ship to your location however you can read the
Tweet media one
Tweet media two
1
0
1
@BHinfoSecurity
Black Hills Information Security
6 days
Join us for this week's ⁠infosec-news stories with the Black Hills Infosec team live at 4:30pm ET on Mondays --
Tweet media one
0
0
2
@BHinfoSecurity
Black Hills Information Security
6 days
If you want to hear more hot takes like the one below from Bronwen, you can check out her past webcasts below!. More Security Lessons Learned Using Copilot -- Security Lessons Learned Using Copilot -- Keeping Things Local – Making
0
2
4
@BHinfoSecurity
Black Hills Information Security
9 days
"Warning: If you don’t follow every step exactly as specified, you will spend hours banging your head against a wall thinking you’ve gone crazy because it worked yesterday, and now everything looks broken because you forgot a single step.".Read more:
Tweet media one
0
2
9
@BHinfoSecurity
Black Hills Information Security
9 days
BACKDOORS & BREACHES - CARD OF THE DAY.Have you experienced this?.Deck: Core Deck 2.2.Attack/Procedure Type: Persistence.Attack/Procedure: Application Shimming. Tools:.Windows Assessment and Deployment Kit (ADK) - Learn more: Play
Tweet media one
0
2
8
@BHinfoSecurity
Black Hills Information Security
10 days
"As with so many other aspects of cybersecurity, it's those boring, routine little things that can and will make the biggest difference in the long run.".Read more: Caging Copilot: Lessons Learned in LLM Security.by: Bronwen Aker.Published: 5/21/2025
Tweet media one
0
3
13
@BHinfoSecurity
Black Hills Information Security
11 days
RT @PeterSchawacker: 🚨 Free #BackdoorsAndBreaches game! 🚨. 📅 Mon, Sept 1.🕗 8:00 AM CST | 6:30 PM IST. Learn incident response the fun way 🎲….
0
1
0
@BHinfoSecurity
Black Hills Information Security
11 days
RT @nate2x4: You gotta do this. Something will probably break, but that's the name of the game.
0
1
0
@BHinfoSecurity
Black Hills Information Security
11 days
RT @IAMERICAbooted: For any org with communications and marketing departments using 3rd party integrations, recall that this is a tenant-wi….
0
2
0
@BHinfoSecurity
Black Hills Information Security
11 days
If you’re attending today’s webast with Bronwen Aker we would love for you to take chance to fill out a quick survey after! Your answers will help us when creating webcast in future. Your participation is always voluntary. Thank you! . Link:
Tweet media one
0
0
1
@BHinfoSecurity
Black Hills Information Security
11 days
0
0
3
@BHinfoSecurity
Black Hills Information Security
12 days
**NEW** BHIS | Blog.Did you know your M365 tenant accepts unauthenticated email for your tenant domains by default?. Stop Spoofing Yourself! Disabling M365 Direct Send.by: @Securecake.Published: 8/20/2025.Learn more:
Tweet media one
0
30
94