VerSprite Shares Cybersecurity News & Security Research VerSprite Shares Cybersecurity News & Security Research

VerSprite Security Resources

Gig Economy & Growing Security Gaps

15 April 2019

As the gig economy, and the use of temporary or on-demand workers, expands at a record pace, there are several security concerns relating to the use of minimally vetted, temporary workers to fill gaps in capabilities or temporarily augment operations.

Read more

arrow right
avatart

posted by Milena Rodban


Building a Valid Threat Library for Cloud Based Applications

14 April 2019

During this talk we’ll look at both Azure and AWS components to leverage when adding threat context and ultimately an amazing threat library to your application threat model. We’ll look at exemplifying these techniques across mission critical infrastructure in energy and transportation.

Read more

arrow right
avatart

posted by Tony UcedaVélez


Phishing Site Uses Google Translate

11 April 2019

An innovative campaign to spread phishing was recently detected. This attack used the Google translate service to make malicious links appear legitimate when visited only on mobile browsers.

Read more

arrow right
avatart

posted by Lucho Torres


Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

10 April 2019

The foundation of VerSprite’s penetration testing methodology is based on emulating realistic attacks by a malicious actor through the use of PASTA (Process for Attack Simulation and Threat Analysis).

Read more

arrow right
avatart

posted by Joaquin Paredes


Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives

3 April 2019

The recent Georgia Institute of Technology data breach exposed 1.3 million student and employee records. Tony UcedaVélez, VerSprite CEO, was interviewed by WSBTV about why such an elite university makes such an attractive target for hackers.

Read more

arrow right
avatart

posted by Tony UcedaVélez


Critical Google Chrome Security Issue

2 April 2019

A critical issue has been discovered in Chrome that allows malicious attackers to escape the browser’s sandbox and execute code on the underlying operating system.

Read more

arrow right
avatart

posted by Lucho Torres



We are an international squad of professionals working as one.

logos