events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Up Next

In The Past

A Process is No One: Hunting for Token Manipulation

Oct 05, 2018

When Macs Come Under ATTCK

Oct 05, 2018

ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK

Sep 06, 2018

Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

Aug 08, 2018

ATT&CKing with Threat Intelligence

Jul 20, 2018

Threat-based Purple Teaming with ATT&CK

May 07, 2018

Working with Binary Data: Writing your own parser

Apr 19, 2018

Auditing Domain Trust Relationships

Apr 19, 2018

The Power of the Dark Side: Offensive PowerShell Workshop

Apr 18, 2018
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert