Home | Resources
Corporate espionage is not a new phenomenon, but dependence on tech, and the ability of corporate spies to steal large amounts of information much faster now than in the past, poses new challenges for firms looking to safeguard intellectual property and sensitive data.
Increasingly sophisticated artificial intelligence (AI) capabilities make headlines daily. AI also comes with a range of security vulnerabilities, some of which can exacerbate a company’s exposure not only to cybersecurity issues, but also geopolitical risk.
Tony started VerSprite with the idea of developing a team of ‘security hybrids’ – consummate security professionals that personify both technical mastery around emerging technologies and associated threats.
Revelations of a massive breach of Google+, a largely defunct challenger to Facebook, suggests that the data of hundreds of thousands of users was compromised over a period from 2015 to March 2018.
With network perimeters becoming more hardened, phishing is an ever-popular way for attackers to gain a foothold into a company network. VerSprite’s own experience with phishing engagements show us just how effective and easy it is to run successful phishing campaigns.
A critical security flaw in Apache Struts2 makes it possible for a cyber attacker to remotely execute code on the vulnerable server and can provide and entry point into your network. Proof of Concept code is already available online for hackers to use and modify to initiate attacks.