VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
Mozilla Firefox Patches Multiple Zero Days
Application Security, Threat & Vulnerability Management

Mozilla Firefox Patches Multiple Zero Days

Mozilla Firefox has patched multiple zero days tha...

NTML Passwords Insecure
Threat & Vulnerability Management

NTML Passwords Insecure

Hashcat is the world's fastest and most advanced p...

Critical Vulnerability in WordPress Core
Threat & Vulnerability Management

Critical Vulnerability in WordPress Core

Security researchers at RIPS Technologies GmbH hav...

Identity and Access Management in Amazon Web Services (AWS)
Threat & Vulnerability Management

Identity and Access Management in Amazon Web Services (AWS)

This blog post reviews best practices and pro tips...

Critical Google Chrome Security Issue
Application Security, Threat & Vulnerability Management

Critical Google Chrome Security Issue

A critical issue has been discovered in Chrome tha...

Why Google Automatic Sign-in is a Privacy Risk
Application Security, Threat & Vulnerability Management

Why Google Automatic Sign-in is a Privacy Risk

A feature has been implemented in a recent Google ...

Can You Spot When You’re Being Phished?
Digital Forensics & Incident Response, Threat & Vulnerability Management

Can You Spot When You’re Being Phished?

What Does it Mean to “Send a Phish”? Phishing ...

PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP
Threat & Vulnerability Management

PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP

As of January 2019 the PHP team will no longer sup...

libSSH Vulnerability: Do You Have to Worry?
Threat & Vulnerability Management

libSSH Vulnerability: Do You Have to Worry?

In October 2018, it was revealed that there existe...

A New Tool for Finding Open S3 Buckets
Threat & Vulnerability Management

A New Tool for Finding Open S3 Buckets

Open web directories have long been a target of ha...

Critical Vulnerability in Apache Struts2
Threat & Vulnerability Management

Critical Vulnerability in Apache Struts2

A critical security flaw in Apache Struts2 makes i...

Plain HTTP Websites Labeled “Not Secure”
Application Security, Threat & Vulnerability Management

Plain HTTP Websites Labeled “Not Secure”

As of the latest release of Chrome, sites not usin...

Unknown jQuery-File-Upload Vulnerability Used for Years
Threat & Vulnerability Management

Unknown jQuery-File-Upload Vulnerability Used for Years

Larry Cashdollar, a Senior Security Response Engin...

The Truth About Chinese Hardware Implants
Threat & Vulnerability Management

The Truth About Chinese Hardware Implants

In October Bloomberg published a bombshell report ...