SECURITY RESOURCES
Offensive minded security exploit development
eBook, Integrated Risk Management (IRM)
Welcome to The World of Geopolitics and Cybersecurity!

Threat Intelligence
Why Bad Guys Do Bad Things: How Maslow’s Hierarchy of Needs Can Help Identify Cyber Threats

eBook, Integrated Risk Management (IRM), Security Awareness
Analyzing the State of Cybersecurity at the End of 2022

Application Security, Security Research
Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command

Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research

Red Teaming and Social Engineering, VerSprite Security Resources
Digital AdTech Firm’s CTO Focuses on Strategic Cybersecurity Alliances to Build Resiliency for Digital Turbine

Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087

CyberWatch, VerSprite Security Resources
VerSprite Cyberwatch: Latest Security News and Advisories

Reports, Threat Modeling
The Origins of Threat Modeling

Security Research
Exploiting Smart Cars Using SDR

Security Research
Exploring Android Vulnerabilities and Binder: Part II

Security Research
Exploring Android Vulnerabilities and Binder: Part I

Threat Modeling
Threat Modeling: A Comprehensive Guide

Threat Intelligence
Cyber Threat Models for Security: Operationalizing CISA Alerts

Threat Intelligence
Risk-Centric Threat Models as Blueprints to Operationalizing Cybersecurity

Subscribe for Our
Updates
Please enter your email address and receive the latest updates