SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD

Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work

Application Security, Security Research
Into the Jar | JSON Pickle Exploitation

Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For

Application Security, Mobile Security Testing, Security Research
Android Titan SMS Trojan Analysis | Part One

Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One

Application Security, Mobile Security Testing, Security Research
Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0

Application Security, Mobile Security Testing, Security Research
Android InfoStealer – Godwon – Analysis

Application Security, Mobile Security Testing, Security Research
Android Emulator Detection

Application Security, Mobile Security Testing, Security Research
Baidu Browser for Android Insecurely Handles the Intent Url Scheme

Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training

Threat & Vulnerability Management
The Truth About Chinese Hardware Implants

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling

Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part Two – Debugging and Tracing with LLDB

Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part One – Configuring LLDB

Subscribe for Our
Updates
Please enter your email address and receive the latest updates