

The Drawbacks of Traditional Vulnerability Management Traditional vulnerability...
NIS – The EU-Wide Cybersecurity Initiative In July 2016, The current Network and...
OpenSSL has categorized the issue as critical, a designation it uses to indicate a...
Within the last year, 29% of businesses within Poland became the subject of at least one cyber-attack. To tackle the ever-growing number of threats, Holm...
What Is Cloud Security Posture Management (CSPM)? CSPM automates the identification and remediation of risks across your cloud assets, including Infrastructure...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...
Social Engineering – The weapon of the cybercriminals toward your human assets Social engineering is the art of exploiting human psychology rather than only...
CVSS is a standardized method used to determine the severity of vulnerabilities in the software across your technical assets. The vulnerabilities are assigned...
General information Two RCEs exist and three vectors are being discussed online (one of which is not known to be remotely exploitable):