SECURITY RESOURCES
Black Hat minded security exploit development
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
Application Security, Information Security Management System (ISMS), Regulatory Compliance, Security Governance
Anti-Nausea Medicine for LastPass, Password Management FUD
Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work
Application Security, Security Research
Into the Jar | JSON Pickle Exploitation
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
Application Security, Mobile Security Testing, Security Research
Android Titan SMS Trojan Analysis | Part One
Information Security Management System (ISMS), Security Governance
Security Metrics Rehab – Part One
Application Security, Mobile Security Testing, Security Research
Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0
Application Security, Mobile Security Testing, Security Research
Android InfoStealer – Godwon – Analysis
Application Security, Mobile Security Testing, Security Research
Android Emulator Detection
Application Security, Mobile Security Testing, Security Research
Baidu Browser for Android Insecurely Handles the Intent Url Scheme
Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training
Threat & Vulnerability Management
The Truth About Chinese Hardware Implants
Subscribe for Our
Updates
Please enter your email address and receive the latest updates