Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Android Vulnerabilities and Exploits
What is responsible disclosure? In this article, VerSprite will outline a typical process for zero-day vulnerability reporting, the ethics behind hacking, and provide real-world examples of our responsible disclosures.
Learn more
VerSprite
Web Application Security
Embedded Device security is increasingly more important to discuss as more everyday and critical medical devices are equipped with them. Learn from our IoT security experts how embedded device security testing can reduce common local & remote attack surfaces.
Robert Hawes
Phishing Attacks
Utilizing reverse proxies offers a more advanced approach for creating phishing web pages that not only allow the Victim User to fully authenticate to their account through a malicious site, but also how to automate the theft of information within the account.
James Sibley
Exploitation of Vulnerabilities
When performing vulnerability research, it is essential to make sure that all attack vectors concerning exploitation are exhausted. One avenue of exploitation comes from the Windows registry.
Cross-Site Scripting (XSS) Attack
Microsoft published an advisory on a critical vulnerability found in the Microsoft Outlook Android application. The attack happens when an email is sent to the victim with an embedded hidden code.
Jason Bell
Microsoft Windows Vulnerabilities
In this blog, we’ll be discussing the discovery, analysis, and exploitation of CVE-2019-8917 which is a remotely exploitable WCF vulnerability that we discovered in SolarWinds Orion NPM 12.3.
Fabius Watson
Inside the domain of vulnerability research, many different methodologies exist for how a researcher may start their journey with auditing an application. This blog provides information on how to enumerate the attack surface of userland applications that are deployed on the Windows operating system.
Microsoft Azure Cloud Computing
Operating your cloud infrastructure isn’t a one-time proposition, so it makes sense that securing it isn’t either. Establishing security compliance controls and then continuously monitoring those controls ensures your infrastructure continues to be secured per policy.
Greg Mosher
The Android operating system and the mobile devices it runs on dominate the market in comparison to other device manufactures. Along with the market share, the Android ecosystem is heavily fragmented; that is to say many individuals are still using older versions of the Android operating system.
Back to Resources
We are an international squad of professionals working as one.
Email
Phone