• NIS2 compliance
    • Knowledge base
      • The NIS & NIS2 Directives
      • New in the NIS2 Directive
      • NIS2 sectors overview
      • Risk management requirements
      • Supply chain security requirements
      • Cyber hygiene requirements
      • 11 steps to compliance
      • Frequently asked questions
    • Resources
      • NIS2 Resource Guide
      • Upgrade Your Defense To Comply with NIS2
      • How the NIS2 Cyber Security Directive Will Impact You
      • NIS2 Local Resources
      • NIS2 in Norway
    • We support compliance
      • How we support NIS & NIS2 compliance
      • Automated & continuous risk assessments
      • Compliance packages for NIS & NIS2
      • Free NIS & NIS2 consultation
      • Book a platform demo
  • Platform
    • Solutions
      • Vulnerability management
      • Attack Surface Management (ASM)
      • External Attack Surface Management (EASM)
      • Automated penetration testing
    • Products
      • System & Network Security
      • Web Application Security
      • Cloud Security (CSPM)
      • API Security
      • Phishing Simulation & Awareness Training
    • Compliance
      • NIS & NIS2
      • DORA
      • ISO 27001
      • PCI DSS
      • GDPR
    • Pricing
    • Free trial
    • Quote
    • Request demonstration/meeting
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • Internet of Things
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transportation
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinar
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
Holm Security Yellow
  • Platform
      Solutions
    • Vulnerability management A complete platform for a systematic, risk-based & proactive cyber defense.
    • Attack Surface Management (ASM) Automatically discover and monitor assets throughout your entire attack surface.
    • External Attack Surface Management (EASM) Automatically discover and monitor internet and web-facing assets.
    • Penetration testing Automated penetration testing, including vulnerability management & ASM.
    • Products
    • System & Network Security Assessment of system/server, computers, network equipment, OT, cloud infra, IoT, and devices.
    • Web Application Security Advanced scanning of modern web applications.
    • Cloud Security (CSPM) Assessment of cloud-native platforms Azure, AWS, Google, and Oracle Cloud.
    • API Security Scanning of all types of REST, GraphQL, and SOAP APIs.
    • Phishing Simulation & Awareness Training Phishing simulation, awareness programs, and questionnaires.
    • Compliance
    • NIS2 logo NIS & NIS2 Platform for NIS and NIS2 compliance.
    • DORA_badge DORA Risk assessments for financial institutes.
    • ISO 27001 logo-1 ISO 27001 Risk assessments for ISO 27001 compliance.
    • PCI DSS_logo PCI DSS ASV for PCI DSS version 4.0 compliance.
    • GDPR logo GDPR Platform to protect personal data.
    • Holm Security VMP
      HOLM SECURITY VMP

      The complete platform for a systematic, risk-based, and proactive cyber defense.

      Pricing Request a quote
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • IoT (Internet of Things)
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transport
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinars
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
en
en Global
fr-be Belgium
da Denmark
fi Finland
de-de Germany
en-my Malaysia
nl Netherlands
no Norway
poland Poland
sv Sweden
en-gb UK
in India
uae Middle East
    • Security Center
    • Organizer
    • Partner Portal
Free trial

Vulnerabilities

OpenSSL update to fix critical vulnerability October 31, 2022 — Cyberattacks & exploits OpenSSL update to fix critical vulnerability A critical vulnerability in the popular open-source cryptographic library OpenSSL will be fixed with the release of version 3.0.7 on 1 November 2022.

Subscribe to our newsletter

Filter posts

All Phishing awareness Vulnerability management
    • Network Security
    • Web Application Security
    • CVSS
    • Company news
    • Agent-based scanning
    • Laws & regulations
    • Penetration testing
Platform
System & Network Security Web Application Security Cloud Security API Security Phishing Simulation & Awareness Training
Solutions
Vulnerability management Attack Surface Management (ASM) External Attack Surface Management (EASM) Automated penetration testing
Take the next step
Pricing Free trial Quote Demonstration/meeting
Industries
Aviation Digital infrastructure Education Energy Financial services Food Government agencies Healthcare Manufacturing & production Municipality Transport Real estate Retail & e-commerce Shipping & maritime Water supply
Professional services
Certification Program Success Program
Compliance
NIS & NIS2 Directive DORA ISO 27001 PCI DSS GDPR
Resources
Blog Resources
Partner
Become a partner Partner sign-up
Company
Contact Join us Management team Our story Press kit
Login
Security Center Organizer Partner Portal
Badges_white
Holm Security Yellow
© 2025 All rights reserved
Follow us on LinkedIn Follow us on YouTube Contact us