SECURITY RESOURCES
Offensive minded security exploit development
Regulatory Compliance
HIPAA with the Security Experts
Slides & Presentations, VerSprite Security Resources
XXE – OWASP
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam
Security Research
Exploiting VyprVPN for MacOS
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints
Application Security, Mobile Security Testing, Security Research
Exploiting the Dolphin Browser for Android’s Backup & Restore Feature
Application Security, Mobile Security Testing, Security Research
Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts
Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
Application Security, Mobile Security Testing, Security Research
Frida Engage Part One | Building an ELF Parser with Frida
VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
Subscribe for Our
Updates
Please enter your email address and receive the latest updates