Peerlyst Inc.

3,444 Flips | 151 Magazines | 6 Following | 102 Followers | @Peerlysters | Peerlyst is building a community where information security pros can team up for a better future—for themselves and their enterprises.

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response

There is often a considerable delay between the discovery of a vulnerability and the issue of a patch. One mitigation strategy for this window of …

Information Security

Perfect SAP Penetration testing (The most Comprehensive Guide)

In the previous articles of Perfect SAP Penetration testing series, we reviewed a general approach to pentesting SAP Systems and finding …

Information Security

The only OSCP advice you will need!!!

In the following article I would like to share my journey into obtaining the Offensive Security OSCP certification. My goal is not to re-iterate what …

European Union

Level Up Your InfoSec Career Part 3

<b>Using a RACI as part of your build/review process to drive consistent operationalization</b><p>Link to Part 2:<p>Today we're going to look at a powerful tool …

Project Management

Tips for an Information Security Analyst/Pentester career - Ep. 54: (Humble) tips for an infosec job

As some of you who follow me closely might know, I recently got a new job as an IT Security Associate, all of a sudden.<p>I'm very excited for this new …

Employment

Python for Penetration Testers Part #5

Introduction and Recap<p>Welcome back to our discussion on Python programming fundamentals. This post is going to take our coding a step further by …

Programming

A wireless security wiki

A wiki for posts on wireless security - both from the red team/pentesting perspective but also from a blue team perspective, plus of course …

Information Security

The Everything Antivirus (AV) wiki

This wiki is for top posts on the topic of Antivirus, not having antivirus, NGAV, bypassing antivirus for pentesters and questions about choosing AV …

Information Security

[Crowdsourcing] A template for a software Installation policy

<Resource for crowdsourced creation><p>Contributors: S. Delano‍<p>Proposed resource structure - for chapter structure. Write a template in a comment below …

Crowdsourcing

PeerTalk™: SMB + Startup CyberSecurity

Peerlyst have put together a global panel featuring experts from Europe, Canada + the US to discuss Cyber Security for startups + Small or …

Cybersecurity

[Crowdsourcing] A free to use wireless communication policy template

<Resource for crowdsourcing><p>Contributors: S. Delano‍<p>We'd like to help people by providing a free template for a wireless communication policy‍.<p>A …

Wireless

A SME’s Quick 10-Step Guide To Cyber Security

<b>There's many ways of losing sensitive data or having it stolen, and with them come many repercussions and punishments - especially for SMEs.</b><p>Nowadays, …

Cybersecurity

At the end, it’s all about protecting the money making machine | Effective Security Management #14

<b>Make each action purpose and data driven</b><p>Both in personal and professional life, trust is hard to earn and unbelievably hard to regain. Every step you …

Information Security

Level Up Your InfoSec Career - Series Wiki

These articles cover specific actions you can take to increase your effectiveness and value to your boss/clients. It is geared toward mid-level and …

Infosec

Level Up Your InfoSec Career Part 7

<b>Soft Skills - Time Management Episode 1</b><p>Link to Part 6:<p>I know what you thought when you read the subtitle. "Time management? What's this doing on an …

Infosec

Non-disclosure agreement (NDA) - How to prepare a good contract and a FREE template to download

Should you Leave Your Partner/Employee If He/She Does Not Sign an NDA ?<p>Getting clients is NOT the biggest issue that companies/founders face when …

Non Disclosure Agreement

How to Make a Career Change from IT to Cyber Security?

<b>How to make a Career Change from IT to Cyber Security?</b><p>In this article, I am guiding toward a career change into cyber security, through the below …

Cybersecurity

Operation Android : Android Pentesting is out.

Master the basics first. I have been doing Mobile app testing for quite sometime, didn’t note down too much data though as everything was hands on, …

Information Security

How to use “The Sleuth Kit” and “Autopsy” | Part 2

Quick Overview<p>In the section we will learn about the following topics:<p>Creating a Sample Case for 4n6 Study.<br>• Learning How to Use FTK Imager.<br>• Start using …

Forensics

Level Up Your InfoSec Career Part 6

<b>Fully Operationalize Your Tools/Technologies - EpisodeThree</b><p>Link to Part 5:<p>In part 5 we looked at an easy way to construct the documents in your …

Infosec

How to use "The Sleuth Kit" and "Autopsy" | Part 1

Hello Peerlysters,<p>Today, we will take a look at one of the most popular opensource forensic tool, Autopsy (GUI frontend for The Sleuth Kit). Perhaps, …

Forensics

Phishing Messages from the Dark: When the Bad Guys Write Back

For most users the experience of dealing with phishing emails‍ is a solitary experience, whether they recognize that they are under attack‍ or remain …

Social Issues

These programs will save your ass when Linux users need you to remove malware

Ha ha, this tux lovin' fool doesn't think they need antivirus protection!<br>Thank you XKCD.<p>My recent posts on tools for removing Windows malware and Mac …

Linux

SQL Injections in SAP

This series of articles will continue our EAS-SEC Guide for secure development that is aimed to unveil all the most important types of …

Databases

Level Up Your InfoSec Career Part 9

Soft Skills - Be A Better Mentor Episode 1<p>Link to Part 8:<p>Since "Through The Hacking Glass" is moving along, I decided to move up some content I was …

Information Security

How Machine Learning Can Be Hacked (3rd part of the series)

Nowadays, AI seems to be taking over everything, and there is a variety of examples of that. One of the areas it's touched is cybersecurity, …

Machine Learning

SAP ABAP Code Injection

I continue describing categories from the list that we discussed in our Introduction to Secure ABAP Development Guide and pursue “Injections”, a type …

Cybersecurity

How to perform Open-Source Intelligence (OSINT)

<b>Abstract</b><p>Hi Peerlysters! In my previous article “Intelligence gathering Methodologies” we had the opportunity to explore different techniques to …

Open Source Movement

How to use “The Sleuth Kit” and “Autopsy” | Part 3

Quick Overview<p>In the section we will learn about the following topics:<p>Learn More about Autopsy and it's internals.<br>• Do a lot of Analytical …

Forensics

The Identity and Access Management (IAM) wiki

Information Security