πŸ”’
❌
There are new articles available, click to refresh the page.
Before yesterdayVerSprite

Understanding Physical and Cyber Threats to the Financial Sector

As physical and cyber attacks increase against the financial industry, VerSprite's Threat Intelligence Group has been tracking the patterns attackers leave. In this article, VerSprite uses an attack tree to map the top methods, motives, and threat organizations the financial industry should be aware of.

The post Understanding Physical and Cyber Threats to the Financial Sector appeared first on VerSprite.

Google Fuchsia OS Sets a New Standard for Operating System Security

20 July 2021 at 12:23

Google's newest OS, Fuchsia, is praised as being more secure than others already on the market. In this article and video, VerSprite dives into Google's Fuchsia OS to determine why the architecture and microkernel allow it to be more secure than Android, Apple, or Windows.

The post Google Fuchsia OS Sets a New Standard for Operating System Security appeared first on VerSprite.

Preventing Physical Security Attacks Against Your Business

2 August 2021 at 21:41

How easy is it to breach your physical security controls? In this article, Versprite shares real red teaming cases where our physical security team hacked into security cameras, cloned badges, walked past guards, and exploited office cybersecurity.

The post Preventing Physical Security Attacks Against Your Business appeared first on VerSprite.

How to Intercept TLS Traffic with ALPN Support

9 August 2021 at 19:27

VerSprite's Offensive Security team releases new, open-source pentesting tool - AlpnPASS. AlpnPASS intercepts TLS traffic more easily between an application and the server. This article provides full background, code, and instructions on how to use the tool for your own clients.

The post How to Intercept TLS Traffic with ALPN Support appeared first on VerSprite.

VerSprite Ranked On the 2021 Inc 5000 List of America’s Fastest Growing Private Companies

17 August 2021 at 13:18

VerSprite Security Consulting receives the 2021 Inc 5000 List of the fastest-growing private companies in America. This is VerSprite's second year in a row to rank on the list. This press release shares our gratitude to our employees and clients, as well as how our company culture allowed us to grow during a global crisis.

The post VerSprite Ranked On the 2021 Inc 5000 List of America’s Fastest Growing Private Companies appeared first on VerSprite.

CISO as a Service: What is a vCISO and what are the benefits?

21 September 2021 at 18:37

A Virtual CISO (vCISO) service provides an experienced security consultant to help guide develope, implement, and manage a strong security program. Learn more about the benefits and costs associated with vCISO services.

The post CISO as a Service: What is a vCISO and what are the benefits? appeared first on VerSprite.

How to Create A Strong Password

1 October 2021 at 14:50

Creating strong passwords doesn't have to be hard. Use our simple tips to create a good password that can't be hacked.

The post How to Create A Strong Password appeared first on VerSprite.

How to Get Executive Buy-in for Your Security Program Budget

5 October 2021 at 11:55

It can be difficult to make a case for security spending. In this article, VerSprite discloses our risk-based approach to getting security program budgets approved by tying risks to business goals.

The post How to Get Executive Buy-in for Your Security Program Budget appeared first on VerSprite.

What Is A Phishing Attack & How to Spot Phishing Emails

8 October 2021 at 18:55

Phishing is a top concern for businesses as ransomware by phishing attacks increase. Learn what a phishing attack is, common types of phishing, and how to spot phishing emails. Share this article with your employees to bring greater awareness to this issue.

The post What Is A Phishing Attack & How to Spot Phishing Emails appeared first on VerSprite.

Is Using Public WiFi Safe?

18 October 2021 at 13:30

Using public WiFi can leave you and your employees open to man-in-the-middle cyber attacks. With the increase of remote work, organizations must teach their employees how to stay safe on open WiFi networks. Get our tips on how to protect against hackers while on open WiFi networks.

The post Is Using Public WiFi Safe? appeared first on VerSprite.

Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work

26 October 2021 at 20:41

Smishing and vishing are types of phishing attacks that use text messaging (SMS) and voice calls to manipulate victims. These types of attacks increasingly target individuals and companies at an alarming rate. Find out how to spot a smishing text or vishing voicemail in this article.

The post Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work appeared first on VerSprite.

Pentester Answers Which Penetration Test is Right for Your Business

8 November 2021 at 16:27

What is penetration testing and which security testing is right for your business model? VerSprite's Director of Sales sat down with VerSprite's Lead Pentester to ask these questions in an on-demand Q&A webinar.

The post Pentester Answers Which Penetration Test is Right for Your Business appeared first on VerSprite.

What is PASTA Threat Modeling?

23 November 2021 at 14:31

PASTA threat modeling is a leading threat model methodology that allows you to realize an attacker's motivations, perform risk analysis, and prioritize risks based on their business impact. This article breaks down all seven stages of the process.

The post What is PASTA Threat Modeling? appeared first on VerSprite.

Vulnerability Assessment vs Penetration Testing vs Red Teaming

9 December 2021 at 06:17

In this article, VerSprite's Offensive Security Leader compares the differences between popular security tests - vulnerability assessments, penetration testing, and red teaming, to help you understand which will best help you move your security maturity forward.

The post Vulnerability Assessment vs Penetration Testing vs Red Teaming appeared first on VerSprite.

Security Vulnerability Classes in Popular Programming Languages

VerSprite's security researchers explain common security vulnerabilities found in programming languages including: Python, JavaScript, PhP, Java, C, C++, and Swift. Plus, get advice for choosing which programing language is best for your application.

The post Security Vulnerability Classes in Popular Programming Languages appeared first on VerSprite.

3 Biggest Threats to the Retail Industry

14 January 2022 at 13:28

Retail is one of the top industries targeted by cyber attacks and physical attacks. VerSprite's Threat Intelligence Group have been tracking patterns of cyber attacks and physical attacks and compiled our findings into one attack tree. In this article, VerSprite uses an attack tree to map the top methods, motives, and threat organizations the financial industry should be aware of.

The post 3 Biggest Threats to the Retail Industry appeared first on VerSprite.

Challenging a Bitcoin Lightning Wallet’s Security

24 February 2022 at 19:47

VerSprite’s Offensive Security team (OffSec) has an extensive history of security testing gaming and fintech organizations. We were hired to push the limits of ZEBEDEE’s application, studying each vulnerability in an in-depth whitebox penetration test. Find out how their developers studied our pentesters in real-time and used it to further fortify their app in our case study.

The post Challenging a Bitcoin Lightning Wallet’s Security appeared first on VerSprite.

Envisions 2022

19 April 2022 at 17:34

In This Report: Gain insight into 2022 cyberthreat trends affecting businesses, organizations, and world governments. Understand the intersection of how cyberwarfare and geopolitics fuel threat campaigns associated with insider threat, misinformation, data harvesting, attacks on critical infrastructure and remote work attack surfaces, IoT proliferation, and more. Review evidence-based predictions on which threats will continue to …

Continue reading "Envisions 2022"

The post Envisions 2022 appeared first on VerSprite.

Bazarloader & Exotic Lily Analysis

27 April 2022 at 21:18

Exotic Lily specializes in breaching a company and then selling the access to the highest bidder. These threat actors shifted their focus from IT, Healthcare, and cybersecurity companies to a broader spectrum of companies.

The post Bazarloader & Exotic Lily Analysis appeared first on VerSprite.

❌