SECURITY RESOURCES
Offensive minded security exploit development
Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169

Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython

Integrated Risk Management (IRM)
US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain

Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, VerSprite Security Resources
Wellness Industry: 10 Ways Data Privacy Can Increase Your Competitive Edge

Integrated Risk Management (IRM)
Utilizing STIX to Foreshadow Cyber Security Risks

Cybersecurity Library, Ebooks & Guides, Threat Modeling, VerSprite Security Resources
The Process for Attack Simulation and Threat Analysis

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Vendor Risk: Product vs. Custom Managed Services

Security Research
Part II: Analysis of a Vulnerable Microsoft Windows Named Pipe Application

Application Security
Phishing Attacks Through Cloned Websites

Security Operations
Network Security & Other Google Cloud Platform Concepts Defined

Security Research
Part I: The Fundamentals of Windows Vulnerable Named Pipes

Threat Modeling, VerSprite Security Resources, Webinars
Leveraging PASTA Threat Modeling for Strategic Security Operations Management & Exploit Testing

Geopolitical Risk, VerSprite Security Resources
Geopolitical Cyber Threats and Business Operations

Security Research
Analyzing CVE-2019-1436 on Windows 10 v1903

Subscribe for Our
Updates
Please enter your email address and receive the latest updates