πŸ”’
❌
There are new articles available, click to refresh the page.
Before yesterdayVerSprite

Age of Misinformation

21 June 2022 at 16:41

Second half of the 20th century saw the dawn of the information age. Now, at the beginning of 21st century, and especially with the proliferation of IoT devices and social media usage, we are seeing the dawn of misinformation.

The post Age of Misinformation appeared first on VerSprite.

Major Threats to the Retail Industry

Our team does extensive work with the retail industry. To give back, we host a living attack tree, free to download. These resources are updated yearly with the most modern and impactful threats, attack surfaces, attack scenarios, and exploitable vulnerabilities our team sees.

The post Major Threats to the Retail Industry appeared first on VerSprite.

Penetration Testing Standards – a Viral Topic at RSAC 2022

9 June 2022 at 15:37

Penetration Testing, frequent misrepresentation of its results, and the effect on the security infrastructure. The feasibility of exploitation should be the main focus of penetration testing, and it is at the core of VerSprite’s testing methodology: solving for the probability variable in a risk analysis of realistic attack patterns.

The post Penetration Testing Standards – a Viral Topic at RSAC 2022 appeared first on VerSprite.

Part 6: Comprehensive Research of Linux Operating System

16 June 2022 at 06:39

This research series examined the Linux OS in detail and discussed everything from its architecture to the drivers and even the exploits. Today, we conclude the comprehensive research of Linux with an overview of its main elements.

The post Part 6: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Threats of IoT Devices

6 June 2022 at 23:59

IoT devices have embedded their way into our daily lives. From appliances, smart home systems, trackers, and doorbells to CPAP machines. We look at the security risks these IOT devices can bring into your life and how you can protect yourself from the risks.

The post Threats of IoT Devices appeared first on VerSprite.

Part 5: Comprehensive Research of Linux Operating System

1 June 2022 at 14:57

To summarize again briefly, syscall is an instruction that lowers the privilege level of the currently running application to 0 and allows the program to be performed in higher privilege using the required registers. In this section, we look at the Syscall instruction at the assembly level and try to analyze it in detail.

The post Part 5: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Part 4: Comprehensive Research of Linux Operating System

26 May 2022 at 17:01

We already know that the entire Linux operating system is written in C. And not just the operating system, but many binaries that run on it are written in C. Although there are multiple reasons for this, the main reason is that C is a very fast and powerful language.

The post Part 4: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Overview of OSINT and Its Importance for Businesses & Organizations

23 May 2022 at 20:54

Open-source information is available through major search engines, but not limited to the websites, databases, and files which Google indexes, Yahoo, Bing, or others. Most information found on β€œdeep web” and β€œdark web” is considered open source.

The post Overview of OSINT and Its Importance for Businesses & Organizations appeared first on VerSprite.

Part 3: Comprehensive Research of Linux Operating System

18 May 2022 at 20:02

As we discussed in the previous parts, the Linux Kernel is a collection of code written entirely in C. This is important to keep in mind while we are dealing with the attack floats because the vulnerabilities found in the Linux Kernel can be found in any executable file written using the C programming language.

The post Part 3: Comprehensive Research of Linux Operating System appeared first on VerSprite.

AltorCloud

13 May 2022 at 22:25

AltorCloud works with single and multi-cloud operations. After the initial setup and configuration, the platform continues to perform real-time monitoring and provides step-by-step instructions to fix issues that it identifies.

The post AltorCloud appeared first on VerSprite.

Part 2: Comprehensive Research of Linux Operating System

11 May 2022 at 22:17

In this section, we explore how these boundaries and privileges are shaped and even how they can change. We analyze User Mode and Kernel Mode, what the modes were developed for, and how the two are related.

The post Part 2: Comprehensive Research of Linux Operating System appeared first on VerSprite.

Insight Into Critical Threat Report Envisions 2022

10 May 2022 at 22:46

Each year, VerSprite's dedicated team of cybersecurity experts monitors new threats, hacker activities, and developments in the geopolitical and cyber world to evaluate and analyze the risks and help organizations to better prepare and protect their assets from digital threats.

The post Insight Into Critical Threat Report Envisions 2022 appeared first on VerSprite.

Comprehensive Research of Linux Operating System

5 May 2022 at 17:32

In the next series of articles, we conduct extensive research on Linux operating system. We do a deep dive into its architecture, strengths, vulnerabilities, and optimal ways to mitigate threats to the system

The post Comprehensive Research of Linux Operating System appeared first on VerSprite.

Bazarloader & Exotic Lily Analysis

27 April 2022 at 21:18

Exotic Lily specializes in breaching a company and then selling the access to the highest bidder. These threat actors shifted their focus from IT, Healthcare, and cybersecurity companies to a broader spectrum of companies.

The post Bazarloader & Exotic Lily Analysis appeared first on VerSprite.

Envisions 2022

19 April 2022 at 17:34

In This Report: Gain insight into 2022 cyberthreat trends affecting businesses, organizations, and world governments. Understand the intersection of how cyberwarfare and geopolitics fuel threat campaigns associated with insider threat, misinformation, data harvesting, attacks on critical infrastructure and remote work attack surfaces, IoT proliferation, and more. Review evidence-based predictions on which threats will continue to …

Continue reading "Envisions 2022"

The post Envisions 2022 appeared first on VerSprite.

Challenging a Bitcoin Lightning Wallet’s Security

24 February 2022 at 19:47

VerSprite’s Offensive Security team (OffSec) has an extensive history of security testing gaming and fintech organizations. We were hired to push the limits of ZEBEDEE’s application, studying each vulnerability in an in-depth whitebox penetration test. Find out how their developers studied our pentesters in real-time and used it to further fortify their app in our case study.

The post Challenging a Bitcoin Lightning Wallet’s Security appeared first on VerSprite.

3 Biggest Threats to the Retail Industry

14 January 2022 at 13:28

Retail is one of the top industries targeted by cyber attacks and physical attacks. VerSprite's Threat Intelligence Group have been tracking patterns of cyber attacks and physical attacks and compiled our findings into one attack tree. In this article, VerSprite uses an attack tree to map the top methods, motives, and threat organizations the financial industry should be aware of.

The post 3 Biggest Threats to the Retail Industry appeared first on VerSprite.

Security Vulnerability Classes in Popular Programming Languages

VerSprite's security researchers explain common security vulnerabilities found in programming languages including: Python, JavaScript, PhP, Java, C, C++, and Swift. Plus, get advice for choosing which programing language is best for your application.

The post Security Vulnerability Classes in Popular Programming Languages appeared first on VerSprite.

Vulnerability Assessment vs Penetration Testing vs Red Teaming

9 December 2021 at 06:17

In this article, VerSprite's Offensive Security Leader compares the differences between popular security tests - vulnerability assessments, penetration testing, and red teaming, to help you understand which will best help you move your security maturity forward.

The post Vulnerability Assessment vs Penetration Testing vs Red Teaming appeared first on VerSprite.

❌