Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 11 to 20
Implementing A Zero-trust Model: The Key To Securing Microservices
20th Oct 2020 [6 months ago] from InfoSec
Introduction Organizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy...
Typo 1: VulnHub CTF Walkthrough (part 1)
19th Oct 2020 [6 months ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Akanksha Sachin Verma. As per the description given by the author, it is an intermediate-level challenge. The goal...
How To Avoid Getting Locked Out Of Your Own Account With Multi-factor Authentication
19th Oct 2020 [6 months ago] from InfoSec
Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond...
Open-source Application Security Flaws: What You Should Know And How To Spot Them
19th Oct 2020 [6 months ago] from InfoSec
Introduction Open-source software helped to revolutionize the way that applications are built by professionals and enthusiasts alike. Being able to borrow a non-proprietary library to quickly prototype and build an application not only...
Source 1: VulnHub CTF Walkthrough
15th Oct 2020 [6 months ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this is an entry-level CTF. The target of this CTF is to...
How To Create A Subdomain Enumeration Toolkit
14th Oct 2020 [6 months ago] from InfoSec
Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two...
Japan’s IoT Scanning Project Looks For Vulnerable IoT Devices
14th Oct 2020 [6 months ago] from InfoSec
The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications...
How To Find Weak Passwords In Your Organization’s Active Directory
14th Oct 2020 [6 months ago] from InfoSec
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There...
Using Merlin Agents To Evade Detection
13th Oct 2020 [6 months ago] from InfoSec
Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in the infrastructure, sometimes establishing an initial foothold on the target can be a big challenge...
The Ultimate Guide To Encryption Key Management
13th Oct 2020 [6 months ago] from InfoSec
Introduction In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption). The first step of preventive security is not encryption; however,...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »