You can’t spell dystopia without AI!
We are excited to be a part of @bsidessf this year!
Join us for a ton of hands-on activities including Choose-your-own-adventure table top exercises, Ransomware-adversary simulator booth and deep hands-on technical workshops!

For more information: https://adversaryvillage.org/adversary-events/BSidesSF-2024/
Register now and reserve your spot for BSidesSF here: https://bsidessf.org
#adversarysimulation #AdversaryVillage #adversarytradecraft #BSidesSF #purpleteaming #SanFrancisco #OffensiveCyberSecurity #threatemulation #adversaryemulation #Breachandadversarialsimulation @SecurityBSidesGlobal

Adversary Village at BSides San Francisco 2024

Adversary Village is a community torqued combat readiness platform purely focuses on Adversary simulation, emulation tactics, APT emulation, Simulation CTFs, Adversary Tactics, life, urban survival skills and purple teaming.

TryHackMe | Cyber Security Training

TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!

TryHackMe

Intro to Threat Emulation - I have just completed this room! Check it out @RealTryHackMe:

💙Understand what Threat Emulation is.
💙Identify various frameworks used in Threat Emulation.
💙Understand how to plan, execute and report emulation exercises.

https://tryhackme.com/room/threatemulationintro #tryhackme #security #blueteam #threatemulation #mitre #attacksimulation #adversaryemulation #atomicredteam

TryHackMe | Intro to Threat Emulation

A look into threat emulation practices as a means of cyber security assessment.

TryHackMe

When you think about threat emulation, don't think along architectural constraints. Think along the route to the impact.

#redteam #threat #ThreatEmulation

An excellent coworker shared this with me today. I had never heard it - and it is a good reminder.
#aws #redteam #threatemulation #leadership
Threat Hunting Series: Using Threat Emulation for Threat Hunting

Originally published on October 10, 2022 on Medium. Author Kostas This post will demonstrate how threat emulation can be used for threat hunting. I often use threat emulation to understand the evidence an attack leaves behind upon execution. While there are many use cases for threat emulation, this post will focus on emulating attackers’ techniques to help with threat hunting. Threat emulation is a powerful tool that can be used for threat hunting. Security teams can generate the necessar

CSNP