Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 11 to 20
Cross-Site Request Forgery (CSRF) Vulnerabilities
30th Jul 2020 [5 days ago] from InfoSec
Introduction to cookies and user authentication Cross-site request forgery (CSRF) vulnerabilities are designed to take actions on a website on behalf of an authenticated user. Accomplishing this...Go on to the site to read the full...
Hack The Box (HTB) Machines Walkthrough Series — Nest, Part 1
30th Jul 2020 [5 days ago] from InfoSec
Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Nest. This is the first half. HTB is an...Go on to the site to read the full...
AWS Storage Services
30th Jul 2020 [5 days ago] from InfoSec
Introduction Amazon offers several storage services, each optimized for specific use cases. In order to choose the best storage for your application, first we must understand the various offerings....Go on to the site to read the full...
Podcast Recap: Fuzzing, Security Testing And Tips For A Career In AppSec
30th Jul 2020 [5 days ago] from InfoSec
Introduction In this episode of Infosec’s Cyber Work Podcast, host Chris Sienko welcomes back previous guest Dr. Jared DeMott. In the previous episode, the topic was all things IoT security. This...Go on to the site to read the full...
Cross-Site Scripting (XSS) Vulnerabilities
30th Jul 2020 [5 days ago] from InfoSec
XSS: The most commonly exploited vulnerability Cross-site scripting (XSS) is one of the most common and well-known vulnerabilities contained within web applications. It consistently appears in the...Go on to the site to read the full...
ICS/SCADA Wireless Attacks
29th Jul 2020 [6 days ago] from InfoSec
Introduction Wireless communication has gained attention in the industrial environment. Many organizations have moved from wired networks to wireless in order to provide IT networks with hassle-free...Go on to the site to read the full...
Security Controls For ICS/SCADA Environments
29th Jul 2020 [6 days ago] from InfoSec
Introduction  An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisition systems (SCADA) are a subset of ICS. ...Go on to the site to read the full...
Least Privilege Vulnerabilities Exploitation Case Study
29th Jul 2020 [6 days ago] from InfoSec
Introduction The principle of least privilege is a security concept that limits security exposure in IT environments through balancing security, productivity, privacy and risk. To put it simply,...Go on to the site to read the full...
Cryptography-based Vulnerabilities In Applications
29th Jul 2020 [6 days ago] from InfoSec
Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a...Go on to the site to read the full...
How To Configure Password Policies In Windows 10
29th Jul 2020 [6 days ago] from InfoSec
Introduction A password is one of the common methods to authenticate user identity. Windows OS comes with various authentication options like PIN, password, fingerprint and token, but the feature...Go on to the site to read the full...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »