Advertisement · 728 × 90

Posts by BC Security

Preview
Black Hat USA 2026 Black Hat USA 2026

BlackHat 2026 is offering 1-day courses for the first time & we are rolling out a brand new course! RTE: Introduction to Ransomware Simulation. Come learn the workflows behind ransomware & the intricacies of crypto-theft. Taught by Hubbl3
Prices go up on May 22nd!

blackhat.com/us-26/traini...

5 days ago 0 0 0 0
Preview
GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

Empire v6.5 is live!
- 8 new modules across BOF/C#/PS/Python
- New C stager + PIC shellcode compiler for stage0 agent injection
- Patchless AMSI & ETW bypasses
- New Jobs tab on the agent page for managing background jobs
- Python 3.14 support
github.com/BC-SECURITY/...

1 week ago 1 1 0 0
Post image

Introducing Starkiller Assistant! Our new AI-powered helper for Empire operators. It's like Clippy, but for C2. After months of R&D, early testers describe it as "confidently wrong" and "worse than no help at all." We're so proud.

2 weeks ago 2 1 0 0
Preview
Introducing SIMAPTIC – An Automated Security Assessment Tool for Small Businesses and Regulatory Compliance - Offensive Security, Penetration Testing, and Training We are introducing SIMAPTIC: an LLM-driven automated security assessment solution built on top of our open-source framework Empire, designed to make enterprise-grade security testing accessible to…

According to the SBA 60% of small businesses close within 6 months of a cyber breach, yet enterprise security testing often leaves organizations priced out.

That Gap shouldn't exist so we built SIMAPTIC! A fully automated internal network testing tool built on Empire.

1 month ago 0 1 0 0
Post image

Empire 6.4 is now public! Here are just a few updates:
- Added C# spawn module
- Auto-install for plugin marketplace
- New task display with parameters
- Added "Rerun Task" to Agents and Plugins
- Added customizable table headers
- Added Debian 13 support

2 months ago 0 0 0 0

Cyber on the rise: In 2025, Taiwan experienced an average of 2.6 million daily cyberattacks on critical infrastructure, from hospitals to energy systems, up from the previous year. Many of these incidents were tied to broader military and political pressure.

www.reuters.com/world/china/...

3 months ago 0 0 0 0
Post image

New year, new site, new tool!

We’ve refreshed the BC Security website and introduced SIMAPTIC, our continuous threat-exposure and validation platform that simulates multi-stage attacks and provides teams with real signals they can act on.
simaptic.ai

Also, check out the new website!
bcsecurity.io

3 months ago 0 0 0 0
Post image

Happy Holidays from all of us at BC Security!

As the year winds down, we just want to say thanks to our clients, partners, and the awesome community around us. Your support means everything, and it’s what keeps us building, learning, and doing what we love.

Thank you to everyone!

3 months ago 0 0 0 0
Post image

Empire v6.3.0 released!!!!

Bringing major upgrades like Starkiller v3.2.0, mTLS support, ChaCha20-Poly1305 encryption, expanded PSExec agent options, and flexible env-based configuration — making Empire more secure and operator-friendly than ever.

github.com/BC-SECURITY/...

4 months ago 1 0 0 0
Preview
GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

Empire v6.3.0 is out!
• mTLS agents & listeners
• ChaCha20-Poly1305 encryption + DH key exchange
• HTTPS host reuse across HTTP & malleable listeners
• Customizable C# obfuscation via EmpireCompiler
• Major dependency upgrades & stability fixes
github.com/BC-SECURITY/...

4 months ago 2 2 0 0
Advertisement
Preview
Empire Operations 1 Empire Operations I is an introductory hands-on course with the Empire Post Exploitation Framework. In this course, students will learn the basics of using and operating Empire while being introduced…

Cyber Monday Deal: Level Up Your Cyber Skills!

One of our flagship cyber courses is going on sale, for a limited time.
If you’ve been waiting to jump into hands-on, operator-level training, now’s your moment.

training.bc-security.org/courses/empi...

4 months ago 0 0 0 0
Preview
Disrupting the first reported AI-orchestrated cyber espionage campaign A report describing an a highly sophisticated AI-led cyberattack

AI-driven cyber-espionage is now real. Anthropic reports autonomous agents running full intrusion chains with minimal human input. Defense has to move at machine speed now. Full report: www.anthropic.com/news/disrupt...

4 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!

Cyber Tip: Segment your administrative network and separate privileged access.

Keep domain controllers, jump servers, and management systems separate from user workstations.
Isolation limits lateral movement and protects privileged credentials.

5 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!

Cyber Tip: Patch your third-party software.
Attackers don’t always need zero-days, just an old plug-in or unpatched tool.
Centralize patching, remove legacy apps, and stay current.
Every unpatched tool is a potential entry point.

5 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!!

Cyber Tip: Rotate service account passwords often. These high-privilege accounts are prime targets for attackers. Regular rotation limits damage and reduces risk.

5 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!

Cyber Tip: Microsoft has officially ended support for Windows 10. Without ongoing security updates, these systems are now vulnerable to new exploits and malware. If you’re still running Windows 10, upgrade as soon as possible to stay secure and compliant.

6 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!!!

Cyber Tip: Close what you don’t use. Unused ports and services expand your attack surface and invite scanning or exploitation. Disabling them keeps your network lean, secure, and harder to breach.

#Cyberaware #CybersecurityAwarenessMonth #Cybersecurity

6 months ago 1 0 0 0
Post image

Cybersecurity Awareness Month!

Cyber Tip: Keep an eye on outbound traffic. Attackers often use it to exfiltrate data or maintain control of compromised systems. Reviewing outbound connections helps you detect and contain threats before sensitive data leaves your network.

6 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!!!

Cyber Tip: Review your PowerShell logs regularly. Attackers often abuse built-in tools like PowerShell to run commands, move laterally, and hide activity. Detailed logging helps spot unusual scripts or commands that may signal an intrusion before it spreads.

6 months ago 0 0 0 0
Post image

Cybersecurity Awareness Month!!!

Cyber Tip: Check file hashes before installing or running downloads. Verifying the SHA256 or MD5 ensures the file hasn’t been tampered with and matches the official source. This quick step helps prevent malware from slipping in through fake or modified installers.

6 months ago 1 0 0 0
Advertisement
Post image

Cybersecurity Awareness Month!!!

Cyber Tip: Use DNS filtering to block malicious domains before they reach your network. Even if someone clicks a bad link, DNS filters can stop the connection, prevent data theft, and reduce overall risk.

#Cybersecurity

6 months ago 1 0 0 0
Post image

Cybersecurity Awareness Month!

Cyber Tip: Never enable macros on documents from unknown or untrusted sources. Attackers often send Word/Excel files that trick you into clicking “Enable Content” to launch malware. If you weren’t expecting the file, don’t trust it.

6 months ago 1 0 0 0
Post image

Happy Cybersecurity Awareness Month!!

We believe awareness is the first line of defense. This month, we’ll share tips and insights from our experts to help protect what matters most.

Tip: Scammers use urgent language to create panic. Don’t rush, pause & verify before acting.

6 months ago 0 0 0 0
Did I Just Fall for a Phishing Attempt?
Did I Just Fall for a Phishing Attempt? In this video, I walk through a scam email notifying me that someone attempted to log into my Twitter account and I needed to authenticate to ensure I hadn't been compromised.

One of our Black Hat instructors analyzes a real phishing email, how it works, the red flags, and how to stay safe.

youtu.be/IFy_96Dg__E?...

#Phishing #SecurityAwareness #Infosec

6 months ago 0 0 0 0
Preview
PyPI urges users to reset credentials after new phishing attacks The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset credentials.

PyPI is warning about a new phishing scam hitting package maintainers. Fake “account verification” emails are floating around, pointing to pypi-mirror[.]org, a fake site built to steal your login.

www.bleepingcomputer.com/news/securit...

6 months ago 0 0 0 0
Post image

“When ‘working as intended’ means leaking sensitive data”
Our analyst Andrew, discovered unauthenticated access to thousands of files and faced roadblocks trying to report it. His blog breaks down what happened and why design flaws matter as much as exploits.
bc-security.org/when-intende...

7 months ago 0 0 0 0
Video

Hot dogs, cold drinks, and… popping shells? This Labor Day, we’re serving up a special Empire Ops 1 Discount. Attackers don’t take holidays, and neither should your defenses.

training.bc-security.org/courses/empi...

#Cybersecurity #RedTeam

7 months ago 1 0 0 0
Post image

@Micrososft highlights top PRC tactics: cloud account abuse (impossible travel, new principals), LOTL lateral movement with psexec/WMI/remote PowerShell, and persistence via web shells on IIS, SharePoint, VPNs, and firewalls. Defenses: MFA, block legacy protocols, hardened configs.

7 months ago 0 0 0 0
Advertisement
Post image

We are honored to be at #DAFITC this year and catch the keynote from Huntress’ CEO. A powerful discussion on how cybercriminals are abusing tools like ScreenConnect and why defenders must stay vigilant. Great insights for everyone in cyber defense. #CyberSecurity

7 months ago 0 0 0 0
Video

AMA starts in a few hours!

Jake Krasnov (BC Security) is hosting a LIVE AMA on r/SolarDIY at 12 PM ET — only a few hours from now!

Bring your cyber questions here: reddit.com/r/SolarDIY

7 months ago 0 0 0 0