Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 81 to 90
Top 5 Ways Ransomware Is Delivered And Deployed
22nd Sep 2020 [2 months ago] from InfoSec
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is fast...Go on to the site to read the full...
Security Theatrics Or Strategy? Optimizing Security Budget Efficiency And Effectiveness
22nd Sep 2020 [2 months ago] from InfoSec
Introduction I am a staunch advocate of the consideration of human behavior in cybersecurity threat mitigation. The discipline of behavioral ecology is a good place to start. This subset of...Go on to the site to read the full article
Exploiting Leading Antivirus Software: RACK911 Labs Details Vulnerabilities
22nd Sep 2020 [2 months ago] from InfoSec
How an antivirus works Antivirus programs are designed to keep your computer safe from malware and other malicious content. In order to minimize the damage that a potentially malicious file can pose...Go on to the site to read the full...
21 Free Training Resources For Cybersecurity Awareness Month (NCSAM 2020)
21st Sep 2020 [2 months ago] from InfoSec
October is Cybersecurity Awareness Month — your best opportunity to jumpstart security awareness at your organization and highlight the importance for every employee to adopt secure habits. At...Go on to the site to read the full...
Capture The Flag: A Walkthrough Of SunCSR’s Geisha
21st Sep 2020 [2 months ago] from InfoSec
Introduction Welcome to my write-up for the Geisha machine from VulnHub. This is a beginner- to intermediate-level, intentionally vulnerable virtual machine created for the purposes of testing and...Go on to the site to read the full...
How To Spot A Malicious Browser Extension
21st Sep 2020 [2 months ago] from InfoSec
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of...Go on to the site to read the...
NY SHIELD Act: Security Awareness And Training Requirements For New York Businesses
21st Sep 2020 [2 months ago] from InfoSec
Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protection Regulation (GDPR) and the California...Go on to the site to read the full...
Purple Fox Malware: What It Is, How It Works And How To Prevent It
16th Sep 2020 [2 months ago] from InfoSec
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend and has had some...Go on to the site to read the full...
Cloud Pentesting Certification Boot Camp: The Ultimate Guide
16th Sep 2020 [2 months ago] from InfoSec
What is a Certified Cloud Penetration Tester (CCPT) certification? The CCPT certification is offered by the Information Assurance Certification Review Board to validate an applicant’s skills in cloud...Go on to the site to read the full...
6 Windows Event Log IDs To Monitor Now
16th Sep 2020 [2 months ago] from InfoSec
Introduction It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This...Go on to the site to read the full...
« Newer 4 5 6 7 8 9 10 11 12 13 Older »