His keynote will focus on how the threat landscape has evolved in the face of modern adversary tradecraft.
Secure your spot ➡️ ghst.ly/socon26-bsky
In Active Directory, the creator of an object (user, computer, group, ...) becomes the object's owner.
What can an owner do? By default, the owner can compromise the created object.
🧵: 1/4
In Active Directory, the creator of an object (user, computer, group, ...) becomes the object's owner.
What can an owner do? By default, the owner can compromise the created object.
🧵: 1/4
Join us in the new year for the Ghostwriter v6.1 webinar, and save your spot now for #SOCON2026, where the community comes together to advance APM.
Webinar 👉 ghst.ly/jan26-web-bsky
SO-CON 👉 ghst.ly/socon26-bsky
Join us in the new year for the Ghostwriter v6.1 webinar, and save your spot now for #SOCON2026, where the community comes together to advance APM.
Webinar 👉 ghst.ly/jan26-web-bsky
SO-CON 👉 ghst.ly/socon26-bsky
When there’s no legitimate use for deception artifacts, interaction becomes high-fidelity signal. In his latest post, Ben Schroeder explains how BloodHound OpenGraph helps defenders plan & implement effective deception. ghst.ly/4b1nu2P
When there’s no legitimate use for deception artifacts, interaction becomes high-fidelity signal. In his latest post, Ben Schroeder explains how BloodHound OpenGraph helps defenders plan & implement effective deception. ghst.ly/4b1nu2P
Check out his blog post detailing new credential dumping techniques that work on fully patched Windows 11 & Server 2025 systems.
➡️ ghst.ly/cred-eoybsky
Check out his blog post detailing new credential dumping techniques that work on fully patched Windows 11 & Server 2025 systems.
➡️ ghst.ly/cred-eoybsky
In 2025, we worked to make adversary tradecraft more accessible, practical, and collaborative for the community.
🧵: 1/5
In 2025, we worked to make adversary tradecraft more accessible, practical, and collaborative for the community.
🧵: 1/5
BloodHound sniffed what attackers might do.
Through graphs and paths it traced the way,
Finding weak links before Christmas Day.
With risks in sight, defenders slept tight—
BloodHound kept watch through the silent night.
🧵: 1/2
BloodHound sniffed what attackers might do.
Through graphs and paths it traced the way,
Finding weak links before Christmas Day.
With risks in sight, defenders slept tight—
BloodHound kept watch through the silent night.
🧵: 1/2
Read Valdemar Carøe’s deep dive 👉 ghst.ly/cert-eoybsky
Read Valdemar Carøe’s deep dive 👉 ghst.ly/cert-eoybsky
👀 Check it out: ghst.ly/mythic-dev
👀 Check it out: ghst.ly/mythic-dev
Watch the full talk playlist ➡️ ghst.ly/socon25-talks
We're looking ahead now to #SOCON2026! Register and save your spot ➡️ ghst.ly/socon26-regb...
Watch the full talk playlist ➡️ ghst.ly/socon25-talks
We're looking ahead now to #SOCON2026! Register and save your spot ➡️ ghst.ly/socon26-regb...
It’s not stopping there! Experience BloodHound Quest on-site at #SOCON2026.
Register 👉 ghst.ly/socon26-eoyb...
It’s not stopping there! Experience BloodHound Quest on-site at #SOCON2026.
Register 👉 ghst.ly/socon26-eoyb...
Built from real operator feedback, it strips away the noise and focuses on what matters most: fast, effective file triage.
Check out the blog post from @harmj0y.bsky.social ➡️ ghst.ly/nem2-eoybsky
Built from real operator feedback, it strips away the noise and focuses on what matters most: fast, effective file triage.
Check out the blog post from @harmj0y.bsky.social ➡️ ghst.ly/nem2-eoybsky
Check out @andyrobbins.bsky.social's post to learn more → ghst.ly/poh-eoybsky
Check out @andyrobbins.bsky.social's post to learn more → ghst.ly/poh-eoybsky
Did you know that with Privilege Zones, you can create custom Labels to organize asset groups? Better yet, Labels receive tags that can be used to build Cypher queries for fine-tuned Attack Path analysis!
🧵: 1/2
Did you know that with Privilege Zones, you can create custom Labels to organize asset groups? Better yet, Labels receive tags that can be used to build Cypher queries for fine-tuned Attack Path analysis!
🧵: 1/2
In his latest Risky Biz interview, Jared Atkinson breaks down how OpenGraph now maps attack paths across GitHub, AWS, SaaS, CI/CD, and beyond, allowing defenders to see what attackers see.
🎧: ghst.ly/4aSxrPY
In his latest Risky Biz interview, Jared Atkinson breaks down how OpenGraph now maps attack paths across GitHub, AWS, SaaS, CI/CD, and beyond, allowing defenders to see what attackers see.
🎧: ghst.ly/4aSxrPY
Browse ➡️ ghst.ly/bql_eoybsky
Browse ➡️ ghst.ly/bql_eoybsky
Andrew Gomez explains how BloodHound graph analysis and Azure Seamless SSO enabled pivoting into the cloud.
Read more: ghst.ly/3MwapV8
Andrew Gomez explains how BloodHound graph analysis and Azure Seamless SSO enabled pivoting into the cloud.
Read more: ghst.ly/3MwapV8
His keynote will focus on how the threat landscape has evolved in the face of modern adversary tradecraft.
Secure your spot ➡️ ghst.ly/socon26-bsky
His keynote will focus on how the threat landscape has evolved in the face of modern adversary tradecraft.
Secure your spot ➡️ ghst.ly/socon26-bsky
Maturity Model → ghst.ly/mm-eoybsky
CISO Guide → ghst.ly/ciso-eoybsky
Maturity Model → ghst.ly/mm-eoybsky
CISO Guide → ghst.ly/ciso-eoybsky
1️⃣ @unsignedsh0rt.bsky.social maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. ghst.ly/3MBPeAW
🧵: 1/2
1️⃣ @unsignedsh0rt.bsky.social maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. ghst.ly/3MBPeAW
🧵: 1/2
Stop by booth 409 today and tomorrow to chat with our team about the latest in Identity Attack Path Management & see BloodHound Enterprise in action.
Stop by booth 409 today and tomorrow to chat with our team about the latest in Identity Attack Path Management & see BloodHound Enterprise in action.
Zach Stein breaks down how it works + how to build a lab to test new tradecraft. ghst.ly/3Ymzfcw
Zach Stein breaks down how it works + how to build a lab to test new tradecraft. ghst.ly/3Ymzfcw
Read → ghst.ly/sapm-eoybsky
Read → ghst.ly/sapm-eoybsky
BloodHound OpenGraph expanded visibility across AWS, GCP, GitHub & more, and sparked projects like PingOneHound, JamfHound, ShareHound & MSSQLHound.
Explore OpenGraph → ghst.ly/bhog-bsky
BloodHound OpenGraph expanded visibility across AWS, GCP, GitHub & more, and sparked projects like PingOneHound, JamfHound, ShareHound & MSSQLHound.
Explore OpenGraph → ghst.ly/bhog-bsky
"Traversable"? "Non-Traversable"? These are terms you may see in BloodHound documentation & discussions, but what do they mean?
We wrote this page to hopefully clear up the confusion w/ these terms: ghst.ly/48OOuSe
"Traversable"? "Non-Traversable"? These are terms you may see in BloodHound documentation & discussions, but what do they mean?
We wrote this page to hopefully clear up the confusion w/ these terms: ghst.ly/48OOuSe
🐕 Full BloodHound integration
📝 Collaborative project notes
📑 Improved caption editor
🌙 Dark mode support
🔐 SSO/MFA & usability upgrades
@printingprops.com breaks down how 6.1 streamlines assessment + reporting. ghst.ly/gwv61-bsky
🐕 Full BloodHound integration
📝 Collaborative project notes
📑 Improved caption editor
🌙 Dark mode support
🔐 SSO/MFA & usability upgrades
@printingprops.com breaks down how 6.1 streamlines assessment + reporting. ghst.ly/gwv61-bsky