Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 1 to 10
Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020
10th Feb 2021 [4 months ago] from ToolsWatch
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATTCK) is a curated knowledge base and model forcyber adversary behavior, reflecting the various phases of an adversary’s lifecycle...[[ This is a content summary only....
Top 10 Most Exploited Vulnerabilities In 2020
25th Jan 2021 [5 months ago] from ToolsWatch
We delved into the tons of vulnerability intelligence data we accumulated over the years. I love to see patterns as I firmly believe that there will be always someone out there that will give these...[[ This is a content summary only. Visit...
VFeed, Inc. Introduces Vulnerability Common Patch Format Feature
26th Dec 2020 [6 months ago] from ToolsWatch
New Feature !Vulnerability Common Patch Format vFeed Vulnerability Intelligence Service was created to provide correlation of a wide range of information datasets and aligning them with common...[[ This is a content summary only. Visit...
Efficiency Of The Vulnerability Response With VFeed Intelligence
28th Sep 2020 [9 months ago] from ToolsWatch
This paper is based on the report from Ponemon Institute “Costs and Consequences of Gaps in Vulnerability Response”. vFeed, Inc outlined the most significant outcomes and mapped them with the data...[[ This is a content summary only....
What’s Wrong With WebSocket APIs - Unveiling Vulnerabilities In WebSocket APIs - Mikhail Egorov
17th Mar 2020 [one year ago] from DeepSec
WebSocket protocol is many times more efficient than HTTP. In recent years we can observe that developers tend to implement functionality in the form of WebSocket APIs instead of traditional REST APIs, that use HTTP. Modern technologies...
What Has Data Science Got To Do With It - Thordis Thorsteins
17th Mar 2020 [one year ago] from DeepSec
In this talk I want to shed some light on data science’s place within security. You can expect to learn how to see through common data science jargon that’s used in the industry, as well as to get a high level understanding of what’s...
Well, That Escalated Quickly - A Penetration Testers Approach To Windows Privilege Escalation - Khalil Bijjou
17th Mar 2020 [one year ago] from DeepSec
Companies engage security experts to penetrate their infrastructures and systems in order to find vulnerabilities before malicious persons do. During these penetration tests, security experts often encounter Windows endpoints or servers...
The Turtle Gone Ninja - Investigation Of An Unusual Crypto-Mining Campaign - Ophir Harpaz And Daniel Goldberg
17th Mar 2020 [one year ago] from DeepSec
At first sight, Nansh0u is yet another attack campaign aiming to mine a marginal crypto-currency named TurtleCoin. However, things get much more interesting once you gain full access to the attacker’s infrastructure. Our investigation...
The Future Is Here - Modern Attack Surface On Automotive - Lior Yaari
17th Mar 2020 [one year ago] from DeepSec
Working as a security researcher for the automotive industry, I received futuristic equipment to test. Test? Hack! In two or three years from now, our vehicles will be full of communication interfaces to the outside world. V2X technologies,...
Lauschgerät - Gets In The Way Of Your Victims Traffic And Out Of Yours - Adrian Vollmer
17th Mar 2020 [one year ago] from DeepSec
The talk will present a new tool for pentesters called "Lauschgerät". This python script acts as a convenient man-in-the-middle tool to sniff traffic, terminate TLS encryption, host malicious services and bypass 802.1X - provided you have...
1 2 3 4 5 6 7 8 9 10 Older »