SECURITY RESOURCES
Offensive minded security exploit development
Threat & Vulnerability Management
Automating Playbooks in D3

OffSec, Penetration Testing, Security Testing
The Intersection of Artificial Intelligence and Social Engineering: Next-Generation Threats

Security Research
Exploit with VS- Labs. CVE-2023-3439: Analyzing UAF Vulnerability in Linux MCTP

Cloud Security, DevSecOps
Identity and Access Management: The First Defense in Cloud Security

Governance Risk & Compliance
Managed Detection and Response Solutions: A Comprehensive Guide

News
Cybersecurity Innovator VerSprite Recognized on the Inc 5000 List for the Fourth Consecutive Year

Governance Risk & Compliance, In The News, Regulatory Compliance
The Positive Impact of New SEC Rules on Cybersecurity Teams

In The News, Threat & Vulnerability Management
The Advancement of AI in Cybersecurity: What You Need to Know

DevSecOps, Software Composition Analysis
Software Composition Analysis: The Changing Role of SCA

Security Research
AFD.sys – Primitives in The Pocket | Integer Shenanigans

Digital Forensics & Incident Response, Governance Risk & Compliance, Risk Assessments, Security Testing, Supply Chains, Threat & Vulnerability Management, Threat Intelligence, Threat Modeling
Risk Assessment: Lessons Learned from the MOVEit Vulnerability

Threat & Vulnerability Management
Proactive Malware Threat-Hunting: Benefits, Techniques, and Trends

Threat & Vulnerability Management, Threat Modeling
Virtual Security Solution for Your Organization – VerSprite VSOC

Threat & Vulnerability Management, Threat Modeling
What is the PASTA Threat Model?

Security Operations, Threat Intelligence, Threat Modeling
Ransomware Recovery – 5 Action Items Missing from Your Plan

Subscribe for Our
Updates
Please enter your email address and receive the latest updates