SECURITY RESOURCES
Offensive minded security exploit development
Threat Intelligence
Why Bad Guys Do Bad Things: How Maslow’s Hierarchy of Needs Can Help Identify Cyber Threats
eBook, Integrated Risk Management (IRM), Security Awareness
Analyzing the State of Cybersecurity at the End of 2022
Application Security, Security Research
Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command
Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research
Red Teaming and Social Engineering, VerSprite Security Resources
Digital AdTech Firm’s CTO Focuses on Strategic Cybersecurity Alliances to Build Resiliency for Digital Turbine
Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087
CyberWatch, VerSprite Security Resources
VerSprite Cyberwatch: Latest Security News and Advisories
Reports, Threat Modeling
The Origins of Threat Modeling
Security Research
Exploiting Smart Cars Using SDR
Security Research
Exploring Android Vulnerabilities and Binder: Part II
Security Research
Exploring Android Vulnerabilities and Binder: Part I
Threat Modeling
Threat Modeling: A Comprehensive Guide
Threat Intelligence
Cyber Threat Models for Security: Operationalizing CISA Alerts
Threat Intelligence
Risk-Centric Threat Models as Blueprints to Operationalizing Cybersecurity
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
Subscribe for Our
Updates
Please enter your email address and receive the latest updates