Home | Cybersecurity Consulting | Research
Maintain awareness regarding unknown threats to your products, technologies, and enterprise networks. Clients that are willing to take the next step in proactively securing their flagship product or environment can leverage our zero-day vulnerability research offering. This subscription-based capability provides the customer immediate access to zero-day vulnerabilities affecting their products, and software used throughout their organization.
Essentially a research for hire for client specific goals and objectives. VerSprite's Research and Development division prides itself on being able to solve technical challenges for our clients. VerSprite's BOSS offering allows our clients to utilize these capabilities and dive into the security internals of their products.
VerSprite's advanced technical security training is created from VerSprite's Research and Development division. VerSprite's training offerings provide unique and original content that targets the advanced user and allows them to up their game in a technical discipline. Learn More →
View our security advisories detailing vulnerabilities found in major products for MacOs, Windows, Android, and iOS.
In this blog, we dive into and show how attackers could combine the 0day CVE-2020-0986 with the 0day in IE browser to achieve privilege escalation and then execute code remotely. Now, Maddie Stone, a security researcher on Google's Project Zero team, found that an attacker can still trigger CVE-2020-0986 and elevate kernel privileges by sending an offset instead of a pointer.