VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats ![What is Responsible Disclosure?](https://versprite.com/wp-content/uploads/2020/07/Responsible-Disclosure-1024x576.png)
Application Security, Security Testing
What is Responsible Disclosure?
![What You Need to Know About Embedded Device Attack Surfaces](https://versprite.com/wp-content/uploads/2020/05/Embedded-Device-1024x576.png)
Application Security, Security Testing
What You Need to Know About Embedded Device Attack Surfaces
![Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor](https://versprite.com/wp-content/uploads/2020/04/penetration-testing-1-1024x576.png)
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
![How to Approach Integrating Application Security into Your Software Development Lifecycle](https://versprite.com/wp-content/uploads/2020/04/SDLC-1-1024x576.png)
Application Security, Security Operations
How to Approach Integrating Application Security into Your Software Development Lifecycle
![How Secure Are Your Universally Unique IDentifiers (UUIDs)?](https://versprite.com/wp-content/uploads/2020/03/Universally-Unique-IDentifiers-UUIDs-1024x576.png)
Application Security, Penetration Testing
How Secure Are Your Universally Unique IDentifiers (UUIDs)?
![Phishing Attacks Through Cloned Websites](https://versprite.com/wp-content/uploads/2019/12/Phishing-Attack-1024x576.png)
Application Security
Phishing Attacks Through Cloned Websites
![Secure Your Website: Simple HTTPS with Nginx](https://versprite.com/wp-content/uploads/2019/11/nginx-proxy-1024x576.png)
Application Security
Secure Your Website: Simple HTTPS with Nginx
![Attacking LastPass: Compromising an Entire Password Database](https://versprite.com/wp-content/uploads/2019/10/lastpass-1-1024x576.png)
Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database
![Mozilla Firefox Patches Multiple Zero Days](https://versprite.com/wp-content/uploads/2019/07/mozilla-firefox-vulnerability-1024x576.png)
Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days
![OH The POSsibilities: Point of Sale System Security](https://versprite.com/wp-content/uploads/2019/06/Point-of-Sale-Insecurities-1024x576.png)
Application Security, Security Research
OH The POSsibilities: Point of Sale System Security
![Attacking Weakly-Configured EAP-TLS Wireless Infrastructures](https://versprite.com/wp-content/uploads/2019/06/wireless-infrastructure-1024x576.png)
Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures
![Phishing Site Uses Google Translate](https://versprite.com/wp-content/uploads/2019/04/Phishing-with-Google-Translate--1024x576.png)
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
![Critical Google Chrome Security Issue](https://versprite.com/wp-content/uploads/2019/04/Google-Chrome-security-1024x576.png)
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue
![Why Google Automatic Sign-in is a Privacy Risk](https://versprite.com/wp-content/uploads/2019/03/Google-Automatic-Sign-in-1024x576.png)
Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk
![TLS 1.3 and Major TLS Libraries Vulnerable](https://versprite.com/wp-content/uploads/2019/03/TLS-1.3-and-Major-TLS-Libraries-Vulnerable-1024x576.png)
Application Security, Security Training