Everything technical
Blogs
Subscribe and get actionable insights delivered to your inbox.
Categories

Penetration Testing as a Service (PTaaS): An Overview
Penetration Testing as a Service (PTaaS) is all...

Ever since it was introduced in 1997 by Jeff Moss, Black Hat has emerged to become one of the most promising...

No matter how many resources and efforts are put forward, companies never seem to be able to close the...

One of the significant challenges for organizations is timely remediation of identified vulnerabilities....

What is Vulnerability Management?
To proactively address vulnerabilities before they are leveraged, organizations...

With the changing digital landscape and multi-year ongoing transformational initiatives across industries,...

In today’s world, cyber threats are becoming more frequent and advanced, making it crucial to ensure...

Why your organization needs more than just a scanner to stay secure?
Vulnerability scanners are one of...

These days in most organizations, DevOps is a term that seems to find its way into practical business...

1. CVE-2022-40139
Severity – High
Improper validation of some components used by the rollback mechanism...

1. CVE-2022-42827
Severity – High
An out-of-bounds write issue was addressed with improved bounds...
No posts found