Exploitation of Vulnerabilities
VerSprite’s Security Research Consultant & VS-Labs Research Leader, Robert Hawes, will be presenting at the Wild West Hackin’ Fest. Robert’s presentation will cover how to perform attack surface enumeration concerning windows userland applications.
Web Application Security
Utilizing reverse proxies offers a more advanced approach for creating phishing web pages that not only allow the Victim User to fully authenticate to their account through a malicious site, but also how to automate the theft of information within the account.
Many sources estimate a 78% increase in supply chain attacks, with many organizations having experienced an attack at an average cost of $1.1 million. Learn about the top issues related to supply chain cybersecurity threats and discover how geopolitical risk and cybersecurity converge in the supply chain space.
During adversarial attack simulations harvesting credentials through phishing are typically performed through cloned websites. A cloned website works by essentially copying the front-end (such as the Gmail login page) and hosting it on a domain designed to mimic the real domain (gmail.com vs. gmail.com-google.net).
Cloud Security Scanner checks for security vulnerabilities in your App Engine and Compute Engine web applications. It is designed to complement your existing secure design and development processes.
In our three-part series Cloud Armor works as a multi-layer firewall for your GCP resources. To configure it, you must use Security Policies which are basically rules that allow or deny traffic from an IP or an IP range.
LastPass is a commonly used cloud-based password management solution that stores hundreds of unique and strong passwords, but what if a user’s entire password database is compromised? While a cloud-based solution to password management is very convenient, it isn’t without its own set of dangers.
Stackdriver provides a centralized method of receiving signals, logs, metrics, and traces from your GCP resources, so you can quickly see when there is any alert on your cloud.
Wellness providers will need to consider data privacy measures in the future. There are three data privacy concerns wellness providers should consider addressing: legal regulations, information technology weaknesses, and employer misuse.
We are an international squad of professionals working as one.
Copyright 2019 VerSprite - All Rights Reserved