SECURITY RESOURCES
Offensive minded security exploit development
Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Online Security Training for Work from Home Remote Employees

Security Training, VerSprite Security Resources
How To Keep Company Data Secure in Remote Office Settings

Security Training, VerSprite Security Resources
Security Risks for Home and Remote Work Networks

VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee

Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff

DevSecOps, VerSprite Security Resources
Shifting Security Left: Why You Shouldn’t Wait to Apply Security Controls

Geopolitical Risk, VerSprite Security Resources
Geopolitical Risk + Cybersecurity Strategy

Security Testing, Threat Modeling, VerSprite Security Resources
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis

Threat Intelligence, Threat Modeling
Threat Modeling Steps: A Blueprint for Threat Intelligence

Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

Application Security, Security Operations
The Software Development Life Cycle & Application Security

Penetration Testing
NordVPN’s Strategic Cybersecurity Partnership with VerSprite

Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64

Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169

Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython

Subscribe for Our
Updates
Please enter your email address and receive the latest updates