Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 61 to 70
MITRE ATT&CK: Audio Capture
5th Nov 2019 [one month ago] from InfoSec
Introduction A common theme in literary, cinematic and real-world espionage is the use of a wire or bug that records audio of a target subject. Audio capture jumped out of these spy novels and movies...Go on to the site to read the full...
If Statements
4th Nov 2019 [one month ago] from InfoSec
Introduction “If” statements in C programming are used to execute a block of statements if a certain condition is true. They allow programmers to control the execution of code and allow user inputs...Go on to the site to read the full...
ThreatMetrix Cybercrime Report: An Interview
4th Nov 2019 [one month ago] from InfoSec
Introduction In a recent Infosec Cyber Work podcast, we welcomed Rebekah Moody, market planning director at ThreatMetrix, a LexisNexis Risk Solutions company. Rebekah also co-authored the H2 2018...Go on to the site to read the full...
Malware Spotlight: Point Of Sale Malware
4th Nov 2019 [one month ago] from InfoSec
Introducing point of sale malware Point of sale (PoS) systems are the payment devices that you can find at almost any store. Depending on their level of sophistication, they allow you to swipe a...Go on to the site to read the full...
MITRE ATT&CK: Screen Capture
4th Nov 2019 [one month ago] from InfoSec
Introduction  There is an old saying that goes “a picture is worth a thousand words.” In many ways, this saying is true: you can learn a great deal about a person or situation if you have a picture...Go on to the site to read the full...
Insider Tips From A Cybersecurity CEO | Cyber Work Podcast
4th Nov 2019 [one month ago] from InfoSec
Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of transparency in job listings and ways to fix the cyber skills gap. View the transcript,...
Red Team Operations: Providing Recommendations
30th Oct 2019 [one month ago] from InfoSec
The importance of recommendations The Red Team’s final report is the most valuable part of the entire exercise for the client. In many cases, a Red Team is secretly hired by an organization’s...Go on to the site to read the full...
Malware Spotlight: Crypto-jacking
30th Oct 2019 [one month ago] from InfoSec
Introduction In this article, we will explore crypto-jacking, a growing malware-based epidemic in the cryptocurrency realm. Before understanding this threat, though, it is necessary to understand...Go on to the site to read the full...
Network Traffic Analysis For IR: Network Mapping For Incident Response
29th Oct 2019 [one month ago] from InfoSec
Introduction to network mapping The concept of network mapping is not a new one. Creating network maps in the design phase of a network and updating them throughout its life cycle is a crucial...Go on to the site to read the full...
Red Team Operations: Reporting For Compliance
29th Oct 2019 [one month ago] from InfoSec
The growing compliance landscape In recent years, the number of standards and regulations that organizations have to demonstrate compliance with has exploded. Previously, organizations have mainly...Go on to the site to read the full...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »