VerSprite Shares Cybersecurity News & Security Research VerSprite Shares Cybersecurity News & Security Research

VerSprite Security Resources

Attacking Weakly-Configured EAP-TLS Wireless Infrastructures

4 June 2019

When performing red teaming engagements, you typically have to assess the Wireless infrastructure used by the target in an attempt to find a way to set foot on their network infrastructure, and then search for completing your goals (which usually include obtaining sensitive business data or accessing critical systems).

Read more

arrow right
avatart

posted by Juan Caillava


2019 Verizon DBIR Confirms Growing Intersection of Geopolitics and Cybersecurity

2 June 2019

Verizon’s 2019 Data Breach Investigations Report (DBIR), an industry benchmark for trends in cybersecurity, validates the growing intersection of geopolitics and cybersecurity. Two particular insights in the data driven report highlight how geopolitics continues to shape the threat landscape faced by businesses.

Read more

arrow right
avatart

posted by GPR VerSprite


NTML Passwords Insecure

10 May 2019

Hashcat is the world’s fastest and most advanced password recovery utility. This software on its 6.0.0 beta version can now crack an eight-character Windows NTLM password hash under 2 hours 30 minutes.

Read more

arrow right
avatart

posted by Lucho Torres


Critical Vulnerability in WordPress Core

10 May 2019

Security researchers at RIPS Technologies GmbH have published research about a critical remote command execution (RCE) in WordPress 5.0. This issue affects all the previous released versions in the past 6 years.

Read more

arrow right
avatart

posted by Lucho Torres


How to Approach Integrating Application Security into Your SDLC

7 May 2019

In this blog post we will take a deeper dive into exactly how to approach integrating security into your Software Development LifeCycle (SDLC). In addition, we will delve into one available resource that provides guidance on how to get started.

Read more

arrow right
avatart

posted by Greg Mosher


Building a Valid Threat Library for Cloud Based Applications

1 May 2019

Download this presentation to take a look at Azure and AWS components and how to leverage both when adding threat context and ultimately an amazing threat library to your application threat model. In addition, learn how to exemplify these techniques across mission critical infrastructure in energy and transportation.

Read more

arrow right
avatart

posted by Tony UcedaVélez



We are an international squad of professionals working as one.

logos