VerSprite Blog
VerSprite Blog
Explore the latest insights and stay informed on evolving digital threats
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn MoreThe Main Tenets of DevOps: “Infrastructure as Code”
DevOps is a fundamental shift in the way we build,…
MiTM Attack Between Target Windows Machines and a DNS Server
When performing this attack, we will find two diff…
libSSH Vulnerability: Do You Have to Worry?
In October 2018, it was revealed that there existe…
How Hackers Can Attack Your Amazon Web Services (AWS) Resources
Stolen credentials remain the number one action in…
The Aadhaar Biometric Database Saga
Aadhaar was developed in 2009 by the Unique Identi…
A New Tool for Finding Open S3 Buckets
Open web directories have long been a target of ha…
No Shortcuts in Cybersecurity
Following recent news reports of substantial data …
VerSprite Reacts: Aviation Scandal & Corporate Espionage
Corporate espionage is not a new phenomenon, but d…
VerSprite Reacts: Artificial Intelligence Security Vulnerabilities
Increasingly sophisticated artificial intelligence…
VerSprite Podcast: Threat Libraries in the Cloud
Tony started VerSprite with the idea of developing…
VerSprite Reacts: Google+ Data Breach
Revelations of a massive breach of Google+, a larg…
Google Thwarts Employee Phishing Attack
With network perimeters becoming more hardened, ph…
Critical Vulnerability in Apache Struts2
A critical security flaw in Apache Struts2 makes i…
VerSprite Reacts: Bloomberg’s Exposé on China
Bloomberg’s exposé on China’s efforts to inf…
What CISOs Need to Know About Geopolitical Risk
A responsible CISO takes command by understanding …