SECURITY RESOURCES
Offensive minded security exploit development
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD
Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work
Application Security, Security Research
Into the Jar | JSON Pickle Exploitation
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
Application Security, Mobile Security Testing, Security Research
Android Titan SMS Trojan Analysis | Part One
Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One
Application Security, Mobile Security Testing, Security Research
Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0
Application Security, Mobile Security Testing, Security Research
Android InfoStealer – Godwon – Analysis
Application Security, Mobile Security Testing, Security Research
Android Emulator Detection
Application Security, Mobile Security Testing, Security Research
Baidu Browser for Android Insecurely Handles the Intent Url Scheme
Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training
Threat & Vulnerability Management
The Truth About Chinese Hardware Implants
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling
Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part Two – Debugging and Tracing with LLDB
Subscribe for Our
Updates
Please enter your email address and receive the latest updates