SECURITY RESOURCES
Offensive minded security exploit development
Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087
CyberWatch, VerSprite Security Resources
VerSprite Cyberwatch: Latest Security News and Advisories
Reports, Threat Modeling
The Origins of Threat Modeling
Security Research
Exploiting Smart Cars Using SDR
Security Research
Exploring Android Vulnerabilities and Binder: Part II
Security Research
Exploring Android Vulnerabilities and Binder: Part I
Threat Modeling
Threat Modeling: A Comprehensive Guide
Threat Intelligence
Cyber Threat Models for Security: Operationalizing CISA Alerts
Threat Intelligence
Risk-Centric Threat Models as Blueprints to Operationalizing Cybersecurity
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
Virtual Security Operations Center vSOC
VerSprite Partners with Stellar Cyber, Cybereason, & D3 Security to Streamline and Automate Virtual SOC Services
VerSprite Security Resources
Zero Trust – a Trendy Buzzword or a Future of Cybersecurity?
Red Teaming and Social Engineering
A Red Teaming Engagement Can Prevent Cybersecurity Attacks
Penetration Testing
QUALITY – INDUSTRY STANDARDS – TRUST
Awards, In The News, News
Growth. Ingenuity. Dedication to the Future of Cybersecurity.
Subscribe for Our
Updates
Please enter your email address and receive the latest updates