SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”

VerSprite Security Resources
Ekoparty 2018

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Evolving with Cybercriminals: How to Respond to Social Engineering Techniques

Security Research
APT MiTM (Man-in-The-Middle) Package Injection

Security Research
Java JSON Deserialization: Memory Corruption Vulnerability

Cloud Security, Regulatory Compliance
How to Manage & Monitor Your Cloud Infrastructure

Security Research
Phishing for Files with Airmail 3 for Mac

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Improving Supply Chain of Medical Devices

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Apparel Manufacturing Client Assessing M&A Target

VerSprite Security Resources
Messaging Security Breach

Integrated Risk Management (IRM)
What is Geopolitical Risk & Why Do You Need It?

Information Security Management System (ISMS), Mobile Security Testing
Why Androids are a Prime Target for Hackers

Integrated Risk Management (IRM)
Cybersecurity & Geopolitical Risk: What Executives Need to Know

Red Teaming and Social Engineering, VerSprite Security Resources
Opening the Black Box of Payment Terminal Security

VerSprite Security Resources
Social Engineering Presentation

Subscribe for Our
Updates
Please enter your email address and receive the latest updates