Contact Us
Error: Contact form not found.
Contact Us
Error: Contact form not found.
Client Login
Select a platform below to log in

Two zero-day vulnerabilities have recently been uncovered in the widely used Ivanti VPN devices, which are actively being exploited.

With the constantly changing environment of technology, it’s important to keep systems up to date with a vulnerability scanner like Qualys.

Introduction In today’s digital world, the protection of sensitive and personally identifiable information (PII) is crucial, especially for financial institutions such as banks and credit unions. We trust these organizations with mass amounts of private data, making them prime attack…

The BREACH Attack is on the rise for improperly configured web applications. Vulnerability assessments and penetration tests can reveal more.

One of the most common medium-risk vulnerabilities we find is the “Missing httpOnly Cookie Attribute” vulnerability.

If a DNS server is not configured properly, the information cache becomes accessible. An attacker can use a DNS cache snooping attack.