VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats
Application Security
A Targeted Vendor Risk Assessment Exposes Vulnerabilities
Application Security, Security Testing
What is Responsible Disclosure?
Application Security, Security Testing
What You Need to Know About Embedded Device Attack Surfaces
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
Application Security, Security Operations
The Software Development Life Cycle & Application Security
Application Security, Penetration Testing
How Secure Are Your Universally Unique IDentifiers (UUIDs)?
Application Security
Phishing Attacks Through Cloned Websites
Application Security
Secure Your Website: Simple HTTPS with Nginx
Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database
Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days
Application Security, Security Research
OH The POSsibilities: Point of Sale System Security
Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue
Application Security, Threat & Vulnerability Management