VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Threat & Vulnerability Management
NTML Passwords Insecure

Threat & Vulnerability Management
Critical Vulnerability in WordPress Core

Threat & Vulnerability Management
Identity and Access Management in Amazon Web Services (AWS)

Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue

Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk

Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?

Threat & Vulnerability Management
PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP

Threat & Vulnerability Management
libSSH Vulnerability: Do You Have to Worry?

Threat & Vulnerability Management
A New Tool for Finding Open S3 Buckets

Threat & Vulnerability Management
Critical Vulnerability in Apache Struts2

Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”

Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years

Threat & Vulnerability Management