❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayVerSprite

Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work

By: VerSprite
26 October 2021 at 20:41

Smishing and vishing are types of phishing attacks that use text messaging (SMS) and voice calls to manipulate victims. These types of attacks increasingly target individuals and companies at an alarming rate. Find out how to spot a smishing text or vishing voicemail in this article.

The post Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work appeared first on VerSprite.

Vulnerability Assessment vs Penetration Testing vs Red Teaming

9 December 2021 at 06:17

In this article, VerSprite's Offensive Security Leader compares the differences between popular security tests - vulnerability assessments, penetration testing, and red teaming, to help you understand which will best help you move your security maturity forward.

The post Vulnerability Assessment vs Penetration Testing vs Red Teaming appeared first on VerSprite.

Security Vulnerability Classes in Popular Programming Languages

VerSprite's security researchers explain common security vulnerabilities found in programming languages including: Python, JavaScript, PhP, Java, C, C++, and Swift. Plus, get advice for choosing which programing language is best for your application.

The post Security Vulnerability Classes in Popular Programming Languages appeared first on VerSprite.

Challenging a Bitcoin Lightning Wallet’s Security

24 February 2022 at 19:47

VerSprite’s Offensive Security team (OffSec) has an extensive history of security testing gaming and fintech organizations. We were hired to push the limits of ZEBEDEE’s application, studying each vulnerability in an in-depth whitebox penetration test. Find out how their developers studied our pentesters in real-time and used it to further fortify their app in our case study.

The post Challenging a Bitcoin Lightning Wallet’s Security appeared first on VerSprite.

Envisions 2022

By: VerSprite
19 April 2022 at 17:34

In This Report: Gain insight into 2022 cyberthreat trends affecting businesses, organizations, and world governments. Understand the intersection of how cyberwarfare and geopolitics fuel threat campaigns associated with insider threat, misinformation, data harvesting, attacks on critical infrastructure and remote work attack surfaces, IoT proliferation, and more. Review evidence-based predictions on which threats will continue to …

Continue reading "Envisions 2022"

The post Envisions 2022 appeared first on VerSprite.

Insight Into Critical Threat Report Envisions 2022

10 May 2022 at 22:46

Each year, VerSprite's dedicated team of cybersecurity experts monitors new threats, hacker activities, and developments in the geopolitical and cyber world to evaluate and analyze the risks and help organizations to better prepare and protect their assets from digital threats.

The post Insight Into Critical Threat Report Envisions 2022 appeared first on VerSprite.

AltorCloud

13 May 2022 at 22:25

AltorCloud works with single and multi-cloud operations. After the initial setup and configuration, the platform continues to perform real-time monitoring and provides step-by-step instructions to fix issues that it identifies.

The post AltorCloud appeared first on VerSprite.

Part 3: Comprehensive Research of Linux Operating System

18 May 2022 at 20:02

As we discussed in the previous parts, the Linux Kernel is a collection of code written entirely in C. This is important to keep in mind while we are dealing with the attack floats because the vulnerabilities found in the Linux Kernel can be found in any executable file written using the C programming language.

The post Part 3: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Overview of OSINT and Its Importance for Businesses & Organizations

23 May 2022 at 20:54

Open-source information is available through major search engines, but not limited to the websites, databases, and files which Google indexes, Yahoo, Bing, or others. Most information found on β€œdeep web” and β€œdark web” is considered open source.

The post Overview of OSINT and Its Importance for Businesses & Organizations appeared first on VerSprite.

Part 5: Comprehensive Research of Linux Operating System

1 June 2022 at 14:57

To summarize again briefly, syscall is an instruction that lowers the privilege level of the currently running application to 0 and allows the program to be performed in higher privilege using the required registers. In this section, we look at the Syscall instruction at the assembly level and try to analyze it in detail.

The post Part 5: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Penetration Testing Standards – a Viral Topic at RSAC 2022

9 June 2022 at 15:37

Penetration Testing, frequent misrepresentation of its results, and the effect on the security infrastructure. The feasibility of exploitation should be the main focus of penetration testing, and it is at the core of VerSprite’s testing methodology: solving for the probability variable in a risk analysis of realistic attack patterns.

The post Penetration Testing Standards – a Viral Topic at RSAC 2022 appeared first on VerSprite.

Russia-Ukraine War, Cyberwarfare, and the Impact on Businesses Worldwide

By: VerSprite
29 June 2022 at 21:13

With the ongoing conflict in Ukraine, we are here to shed some light on the cyberattacks going on between Russia and Ukraine, how it is shaping the geopolitical landscapes, and the cybersecurity impact the war is having on organizations and businesses around the world.

The post Russia-Ukraine War, Cyberwarfare, and the Impact on Businesses Worldwide appeared first on VerSprite.

ERAs are Dead. Long Live the Organizational Threat Model!

18 July 2022 at 18:29

The OTM is a 7-stage process, inspired by the application threat modeling methodology, PASTA, that is applied at an organizational level. Much like application threat models, the intent is to have risks proven by various important contexts – business impact, likelihood, and the effectiveness of native countermeasures (or controls) that help reduce inherent risk levels.

The post ERAs are Dead. Long Live the Organizational Threat Model! appeared first on VerSprite.

Building a Modern Effective SOC – A Realistic Undertaking in 2022?

By: VerSprite
20 July 2022 at 22:07

A SOC is the company’s guide and armor in the world of cyber security. In the ever-evolving cyber landscape, a well-functioning SOC ensures organization’s continuity and scaling. A security operations center functions are not limited to just cyber threat intelligence analysis and prevention.

The post Building a Modern Effective SOC – A Realistic Undertaking in 2022? appeared first on VerSprite.

Staying Lean with Cybersecurity Efforts when Budgets are Tight

By: VerSprite
2 August 2022 at 22:21

2022 is becoming the year that is drastically changing the cybersecurity landscape. We are witnessing sweeping layoffs and budget cuts. But will it save organizations money and help get through the tough economic times, or can it only become detrimental to organizations?

The post Staying Lean with Cybersecurity Efforts when Budgets are Tight appeared first on VerSprite.

❌
❌