SECURITY RESOURCES
Offensive minded security exploit development
Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research

Red Teaming and Social Engineering, VerSprite Security Resources
Digital AdTech Firm’s CTO Focuses on Strategic Cybersecurity Alliances to Build Resiliency for Digital Turbine

Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087

CyberWatch, VerSprite Security Resources
VerSprite Cyberwatch: Latest Security News and Advisories

Reports, Threat Modeling
The Origins of Threat Modeling

Security Research
Exploiting Smart Cars Using SDR

Security Research
Exploring Android Vulnerabilities and Binder: Part II

Security Research
Exploring Android Vulnerabilities and Binder: Part I

Threat Modeling
Threat Modeling: A Comprehensive Guide

Threat Intelligence
Cyber Threat Models for Security: Operationalizing CISA Alerts

Threat Intelligence
Risk-Centric Threat Models as Blueprints to Operationalizing Cybersecurity

Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

Virtual Security Operations Center vSOC
VerSprite Partners with Stellar Cyber, Cybereason, & D3 Security to Streamline and Automate Virtual SOC Services

VerSprite Security Resources
Zero Trust – a Trendy Buzzword or a Future of Cybersecurity?

Red Teaming and Social Engineering
A Red Teaming Engagement Can Prevent Cybersecurity Attacks

Subscribe for Our
Updates
Please enter your email address and receive the latest updates