SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources
Messaging Security Breach
Integrated Risk Management (IRM)
What is Geopolitical Risk & Why Do You Need It?
Information Security Management System (ISMS), Mobile Security Testing
Why Androids are a Prime Target for Hackers
Integrated Risk Management (IRM)
Cybersecurity & Geopolitical Risk: What Executives Need to Know
Red Teaming and Social Engineering, VerSprite Security Resources
Opening the Black Box of Payment Terminal Security
VerSprite Security Resources
Social Engineering Presentation
Security Awareness, Security Research
Abusing Insecure Windows Communication Foundation (WCF) Endpoints
VerSprite Security Resources, Videos
Secure Development of Payment Applications
Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age
VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation
Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT
Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018
Security Research
Frida Engage Part Three | You Down With XPC?
Security Research
Oh the POSsibilities – Point-Of-Sale Insecurity
Security Research
XML EXTERNAL ENTITY (XXE) Processing
Subscribe for Our
Updates
Please enter your email address and receive the latest updates