White Knight Labs Is a Go-To Cyber Consultancy

An article by Amit Chowdhry posted on Pulse 2.0 discusses White Knight Labs, a cybersecurity consultancy founded by Greg Hatcher and John Stigerwalt, specializes in penetration testing and red teaming. The company focuses on providing deep technical expertise at a reasonable price, and its team of engineers have a wide range of specialties, such as Windows implant development and iOS application testing. White Knight Labs is currently working on a web application for red teamers to automate Endpoint Detection and Response (EDR) bypass features, as well as creating an OnDemand offering of their Offensive Development and Advanced Red Team Operations courses. read article
Revolutionizing Cybersecurity with GPT

This article, written by Greg Hatcher, CEO of White Knight Labs, discusses how the generative pre-trained transformer (GPT) can be used as a powerful tool for cybersecurity. GPT is a type of artificial intelligence that uses machine learning to process natural language. The article explains how GPT can be used to improve all facets of cybersecurity strategies, including threat detection, password analysis, and social engineering attack detection. However, the article also warns that GPT can be used by threat actors to carry out more effective attacks, and that cybersecurity professionals need to stay ahead of those who seek to use the same capabilities of GPT to undermine security. Overall, the article highlights the potential benefits and risks of using GPT in cybersecurity and emphasizes the importance of properly guarding GPT systems to prevent malicious attacks. Read article by Greg Hatcher
Businesses must brace for AI-powered attacks

White Knight Labs CEO Greg Hatcher was quoted in an article by Mayank Sharma posted on Middle East Economy. The article discusses the potential for artificial intelligence (AI) and machine learning (ML) to be used in cyber attacks, and how businesses need to prepare for this new threat. The article highlights how AI and ML can be used to create convincing phishing emails, generate malware, and create fake videos and images that can be used for blackmail or disinformation campaigns. However, the article also notes that AI and ML can be used by defenders to detect and respond to attacks faster than ever before. The article emphasizes the need for businesses to be aware of this new threat and to take steps to protect themselves. Read article here
Cracking the Code

Writing for the San Francisco Post, Anthony Carter writes about “A small but mighty cybersecurity firm” How does one know if the cybersecurity firm they partner with is right for them? To ensure the best protection against ever-evolving cyber threats, businesses must partner with a cybersecurity provider that is up-to-date and understands the individual needs of their business. White Knight Labs, a small, but mighty cybersecurity firm, is one such provider. Their experienced team works intimately with their clients, offering personalized, risk-based approaches to improve the security of their business. Read article here
CFO’s need to Evaluate and Prioritize Cybersecurity Initiatives

In CFO, Adam Zaki talks to White Knight Labs CEO, Greg Hatcher, about the concerns and increasing risk that companies are facing. With control of the purse strings and many times also overseeing the IT organization, the CFO is becoming more involved in discussions of technology and risk mitigation that differ from the financial roots of the position. Adam points out that “many CFOs and other C-suite members are still unsure how to handle large amounts of increasingly valuable data. “ Read the entire article
Innovation and Leadership

In an article published by Voyage New York, Blanch Sheldon takes a look at the beginning of White Knight Labs, some of the great work that White Knight Labs has done in prevention of zero day exploits and the related ransomware attacks, and touches on the “Upcoming Crusades”. Read the full article
Offensive Development w/ Greg Hatcher & John Stigerwalt

A Training program led by the co-founders of White Knight Labs Dive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for multiple bypasses within a single piece of code. This course is designed to take you deep into defensive and offensive tooling – an apex attacker must know the own indicators of compromise (IOCs) they’re creating and the artifacts they’re leaving behind. For more information
White Knight Labs sponsors CSA West Michigan St. Patrick’s Bash

ChatGPT and the security risks of Generative AI

A recent Salesforce.com survey found that 67% of 500 senior IT leaders surveyed are prioritizing Generative AI technology for their organizations during the next 18 months, but the same survey found that 71% of those leaders believe the same technology is likely to “introduce new security risks to our data.” Did you see that? 71% Read full article at Fierce Electronics
AASLR: Hiding Your Malware’s Strings and Imports

Ryan from Black Hills Information Security and Greg Hatcher, co-founder of White Knight Labs, discussing AASLR (Antisyphon Address Space Layout Randomization)