BC Security

314 Followers
4 Following
285 Posts

ATE: Active Directory, is being offered at #BHUSA! Come learn all the nuances behind delegation attacks, forest trusts, certificate abuse, and more! AD is one of the largest attack surfaces in modern environments, so upgrade those skills today.
@BlackHatEvents

Prices go up on May 22nd! Don't miss out!

https://blackhat.com/us-26/training/schedule/index.html#advanced-threat-emulation-active-directory-bhat-edition-50907

Had a great time on the Offensive Security panel @HackRedCon today. We had a lot of interesting questions from the audience. The most interesting one, though, was: "Do we expect to see auditors for things like SOC 2 start accepting AI-executed security assessments in the near future?"

The panel was evenly split. What are your thoughts on it?

New to offensive security and not sure where to start? Or part of the blue team looking to get a broad overview of C2 infrastructure? Check out our new one-day course at Black Hat, RTE: Foundations of Command and Control. Learn the ins & outs of the core technology that attackers use today. Prices go up May 22nd!

https://blackhat.com/us-26/training/schedule/index.html#red-team-essentials-foundations-of-command-and-control-50958

Back by popular demand, we will be teaching ATE: Active Directory again at #BHUSA this year! One of our most popular classes every year. Prices go up at the end of May, don't miss out!

https://blackhat.com/us-26/training/schedule/index.html#advanced-threat-emulation-active-directory-bhat-edition-50907

Black Hat 2026 is offering 1-day courses for the first time ever & we are rolling out a brand new course as a result! RTE: Introduction to Ransomware Simulation. Come learn the workflows behind ransomware & the intricacies of crypto-theft. Taught by Jake Krasnov
Prices go up on May 22nd!

https://blackhat.com/us-26/training/schedule/index.html#red-team-essentials-introduction-to-ransomware-simulation-51010

Empire v6.5 is live!
- 8 new modules across BOF/C#/PS/Python
- New C stager + PIC shellcode compiler for stage0 agent injection
- Patchless AMSI & ETW bypasses
- New Jobs tab on the agent page for managing background jobs
- Python 3.14 support
https://github.com/BC-SECURITY/Empire
GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub
Introducing Starkiller Assistant! Our new AI-powered helper for Empire operators. It's like Clippy, but for C2. After months of R&D, early testers describe it as "confidently wrong" and "worse than no help at all." We're so proud.

According to the SBA 60% of small businesses close within 6 months of a cyber breach, yet enterprise security testing often leaves organizations priced out.

That Gap shouldn't exist so we built SIMAPTIC! A fully automated internal network testing tool built on Empire.
→ Powered by Empire, trusted by Fortune 500s & gov agencies
→ Reports mapped to MITRE ATT&CK & NIST 800-53
→ On-demand. A fraction of the cost.

Every organization deserves to know where they stand.
https://bcsecurity.io/blog/introducing-simaptic/

Introducing SIMAPTIC – An Automated Security Assessment Tool for Small Businesses and Regulatory Compliance - Offensive Security, Penetration Testing, and Training

BC Security provides offensive security services, penetration testing, training, and open-source tools including Empire and Starkiller.

bcsecurity
Empire 6.4 is now public! Here are just a few updates:
- Added C# spawn module
- Auto-install for plugin marketplace
- New task display with parameters
- Added "Rerun Task" to Agents and Plugins
- Added customizable table headers
- Added Debian 13 support

Cyber on the rise: In 2025, Taiwan experienced an average of 2.6 million daily cyberattacks on critical infrastructure, from hospitals to energy systems, up from the previous year. Many of these incidents were tied to broader military and political pressure.

https://www.reuters.com/world/china/chinese-cyberattacks-taiwan-infrastructure-averaged-26-million-day-2025-report-2026-01-05/

It’s a massive reminder that cyber threats aren’t abstract. They’re persistent, strategic, and evolving. Staying proactive about defense and awareness isn’t optional anymore.