events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Training Offering
Upcoming
virtual

Workshop: A Wild AWS Account Has Appeared

July 25, 2023; 1:00pm - 3:00pm ET
Register
Training Offering
Upcoming
virtual

Workshop: Mythic Developer Series – Laying the Foundation

June 27, 2023; 1:00pm - 3:00pm ET
Register
Training Offering
Past

Workshop: Deconstructing Adversary Tradecraft

Training Offering
Upcoming
virtual

Adversary Tactics: Tradecraft Analysis

August 22 - 25, 2023; US time zone
Register
Training Offering
Upcoming
virtual

Adversary Tactics: Detection

August 22 - 25, 2023; US time zone
Register
Training Offering
Upcoming
virtual

Adversary Tactics: Red Team Operations

August 22 - 25, 2023; US time zone
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Active Directory Security Fundamentals

August 7 - 8, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Active Directory Security Fundamentals

August 5 - 6, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Vulnerability Research for Operators

August 7 - 8, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Vulnerability Research for Operators

August 5 - 6, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Mac Tradecraft

August 5 - 8, 2023
Register
Training Offering
Upcoming
in-person

Black Hat USA 2023 – Adversary Tactics: Tradecraft Analysis

August 5 - 8, 2023
Register

Up Next

In The Past

Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”

Jan 24, 2018

A Process is No One: Hunting for Token Manipulation

Dec 07, 2017

Subverting & Restoring Trust in Windows

Nov 07, 2017

_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software

Nov 07, 2017

Windows Operating System Archaeology

Oct 27, 2017

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Oct 25, 2017

How Graphs Changed The Way Hackers Attack

Oct 25, 2017

Not a Security Boundary: Bypassing User Account Control

Sep 24, 2017

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Sep 22, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert