Years of leveraging OSINT as part of the company’s red team services, and as part of its proprietary Organizational Threat Models (OTM), VerSprite has evolved as a leader in harvesting OSINT that is specific to your company’s threat model. VerSprite’s Threat & Vulnerability Management team ensures that intelligence that is harvested and reviewed is relevant and actionable to a custom-built threat model for each of our clients.
VerSprite provides experienced OSINT gathering tradecraft supported by multiple analytics tools that help to explore large volumes of harvested information from various threat sources. Below is a list of our client-specific OSINT planning, collection, analysis, and reporting services.
Social Media Intelligence - SOCMINT
Fuse and layer large volumes of proprietary and OSINT data
Recognized leaders in OSINT tradecraft and intelligence analysis
Extensive scope of subject-matter expertise
Powerful software tools
Scalable: one-off, ad-hoc, or subscription-based options
Applicable to all sectors
In addition to the OSINT Services listed above, VerSprite also offers Threat Hunting. Our team of experts investigates potential risks and tracks suspicious behavior using machine learning, threat analytics, and open-sourced intelligence gathering techniques. We capture threat indicators that identify both traditional and non conventional threats to your business.
Interested in learning more? View VerSprite’s presentation: “Threat Hunting: What's on Your Network?”
In this blog, we dive into and show how attackers could combine the 0day CVE-2020-0986 with the 0day in IE browser to achieve privilege escalation and then execute code remotely. Now, Maddie Stone, a security researcher on Google's Project Zero team, found that an attacker can still trigger CVE-2020-0986 and elevate kernel privileges by sending an offset instead of a pointer.
Let us build a tailored engagement for you.