Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 21 to 30
21 Free Training Resources For Cybersecurity Awareness Month (NCSAM 2020)
21st Sep 2020 [3 days ago] from InfoSec
October is Cybersecurity Awareness Month — your best opportunity to jumpstart security awareness at your organization and highlight the importance for every employee to adopt secure habits. At...Go on to the site to read the full...
Capture The Flag: A Walkthrough Of SunCSR’s Geisha
21st Sep 2020 [4 days ago] from InfoSec
Introduction Welcome to my write-up for the Geisha machine from VulnHub. This is a beginner- to intermediate-level, intentionally vulnerable virtual machine created for the purposes of testing and...Go on to the site to read the full...
How To Spot A Malicious Browser Extension
21st Sep 2020 [4 days ago] from InfoSec
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of...Go on to the site to read the...
NY SHIELD Act: Security Awareness And Training Requirements For New York Businesses
21st Sep 2020 [4 days ago] from InfoSec
Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protection Regulation (GDPR) and the California...Go on to the site to read the full...
Purple Fox Malware: What It Is, How It Works And How To Prevent It
16th Sep 2020 [9 days ago] from InfoSec
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend and has had some...Go on to the site to read the full...
Cloud Pentesting Certification Boot Camp: The Ultimate Guide
16th Sep 2020 [9 days ago] from InfoSec
What is a Certified Cloud Penetration Tester (CCPT) certification? The CCPT certification is offered by the Information Assurance Certification Review Board to validate an applicant’s skills in cloud...Go on to the site to read the full...
6 Windows Event Log IDs To Monitor Now
16th Sep 2020 [9 days ago] from InfoSec
Introduction It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This...Go on to the site to read the full...
Time To Update Your Cybersecurity Policy?
15th Sep 2020 [10 days ago] from InfoSec
Introduction In today’s highly connected world, new cyberthreats and risks emerge seemingly every hour, around the clock. Whether it is from spearphishing, a distributed denial-of-service attack or a...Go on to the site to read the full...
Ransomware Deletion Methods And The Canary In The Coal Mine
15th Sep 2020 [10 days ago] from InfoSec
Introduction  Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker, the threats are increasing,...Go on to the site to read the full...
Android App Security: Over 12,000 Popular Android Apps Contain Undocumented Backdoors
15th Sep 2020 [10 days ago] from InfoSec
Many Android apps contain hidden secrets When many people think about malware and other malicious or suspicious software, they focus on computers. It is common best practice to have an antivirus...Go on to the site to read the full...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »