EASM
24 Jun 2021
Many people wonder how an external attack surface management (EASM) solution is different from a traditional vulnerability scanner or a penetration testing exercise. These solutions partially overlap on some use cases, but in essence, they are not in competition with each other. In…
EASM
01 Apr 2021
A relatively new cybersecurity problem space with its own definition has been coined since a few years now: Attack Surface Management or ASM. The term can be confusing or vague without spending some time on a clear definition. In cybersecurity…
Application Security
21 Feb 2020
Hackers are using the 'Reaver' tool to exploit the WiFi Protected Setup (WPS) feature found on many WiFi routers and access points. This method involves remotely brute-forcing the WPS handshaking process to potentially crack a WPA network. Most networks will…
EASM
24 Sep 2019
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied or abused. In many cases the law cannot help as the attacker cannot be identified. The problem of fake websites is…