Public Exposure
  • Posts
  • Authors
  • About
  • Contact
  • Write for Us
post image

Robot vs. Robot - May the Best AI Win

  • Mikko Hyppönen
  • Date : June 13, 2023
  • Categories : Cyber threat ,Public exposure
post image

Deepfake: Unearthing the Status Quo

  • Max Bineder , Manuel Werka
  • Date : March 14, 2023
  • Categories : Public exposure ,Fraud
post image

Theft-as-a-Service on Ethereum

  • Ben Weintraub
  • Date : January 10, 2023
  • Categories : Public exposure ,Fraud
post image

Integrity Checking - an Integral Part of Cyber Security

  • Joona Hoikkala , Tomi Koski
  • Date : July 12, 2022
  • Categories : Public exposure ,Vulnerability disclosure ,Cyber threat ,Vulnerability research
post image

Management Interfaces - Attack Surface Hidden in Plain Sight

  • Lari Huttunen
  • Date : June 14, 2022
  • Categories : Public exposure ,External attack surface ,Cyber threat ,Management interface
post image

Practical Methods for Assessing Your External Attack Surface

  • Juhani Eronen
  • Date : March 22, 2022
  • Categories : Public exposure ,External attack surface ,Cyber threat
post-thumb post-thumb post-thumb

How to Identify Attack Surface that Must be Addressed

  • Juhani Eronen
  • Date : November 8, 2022
  • Categories : Public exposure ,External attack surface

Some time in January 2022, I promised to Lari to write up some thoughts on attack surface …

Continue Reading
post-thumb

WordPress Version? Make Sure You're Running the Latest Supported

  • Lari Huttunen
  • Date : October 11, 2022
  • Categories : Public exposure ,Vulnerability research ,Cyber threat ,External attack surface

It all started with Miles Davis in 2004, when WordPress 1.0 was released that is. Since then, the …

Continue Reading
post-thumb

Software Dependency Failures: jQuery, a Canary in the Coal Mine

  • Lari Huttunen
  • Date : September 13, 2022
  • Categories : Cyber threat ,Public exposure ,External attack surface ,Vulnerability research

Keeping dependencies up-to-date is challenging for any software development project and even more so …

Continue Reading
post-thumb

Integrity Checking - an Integral Part of Cyber Security

  • Joona Hoikkala , Tomi Koski
  • Date : July 12, 2022
  • Categories : Public exposure ,Vulnerability disclosure ,Cyber threat ,Vulnerability research

During the last twenty years there has been endless talks and discussions regarding the importance …

Continue Reading
post-thumb

Further Examination into External Attack Surface

  • Juhani Eronen
  • Date : June 28, 2022
  • Categories : Public exposure ,External attack surface ,Cyber threat

Reducing Attack Surface Decreases Security Risk In my previous write-up I explained why tracking …

Continue Reading
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
About Public Exposure
Public Exposure, a Blog on Cybersecurity We at Arctic Security want to offer …
About
promotion-image
Your attack surface is showing.

Find out why
Categories
  • Cyber defense (1)
  • Cyber threat (12)
  • External attack surface (11)
  • Fraud (3)
  • It asset management (2)
  • Management interface (2)
  • Public exposure (21)
  • Vulnerability disclosure (1)
  • Vulnerability research (4)
Latest Write-Ups
  • post-thumb
    Cyber Warrior: Who is Behind the Cyber Shield?
    September 12, 2023
  • post-thumb
    Tilting at Wind Farm Portals - a Modern Day Quixotic Challenge
    August 8, 2023
  • post-thumb
    Woocommerce with Wordpress - a Woe in its Own Right
    July 11, 2023
Social Links
Public Exposure

[nominal] The opening of a subject to widespread discussion and debate.

Quick Links
  • About
  • Contact
  • Privacy Policy
Social Links
  • twitter
  • linkedin
  • github
Subscribe Newsletter