SECURITY RESOURCES
Offensive minded security exploit development
Integrated Risk Management (IRM), News
Nordstream Pipelines Attacks

eBook, Integrated Risk Management (IRM)
Envisions Geopolitical Threat Report:

Application Security, Penetration Testing
Universally Unique IDentifiers (UUIDs) Are Yours Secure?

Data Privacy & Development of Security Policies, Governance Risk & Compliance
Turn Data *Mis*Management into Data Security

Governance Risk & Compliance, Security Awareness
Domain Spoofing and Phishing Attacks

OffSec, Regulatory Compliance
PCI DSS 4.0: What You Need to Know and What You Need to Do

OffSec
AI and Cybersecurity: Threats and Opportunities

eBook, Integrated Risk Management (IRM)
Welcome to The World of Geopolitics and Cybersecurity!

Threat Intelligence
Why Bad Guys Do Bad Things: How Maslow’s Hierarchy of Needs Can Help Identify Cyber Threats

eBook, Integrated Risk Management (IRM), Security Awareness
Analyzing the State of Cybersecurity at the End of 2022

Application Security, Security Research
Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command

Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research

Red Teaming and Social Engineering, VerSprite Security Resources
Digital AdTech Firm’s CTO Focuses on Strategic Cybersecurity Alliances to Build Resiliency for Digital Turbine

Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087

CyberWatch, VerSprite Security Resources
VerSprite Cyberwatch: Latest Security News and Advisories

Subscribe for Our
Updates
Please enter your email address and receive the latest updates