Application Security
27 Apr 2023
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this…
EASM
17 Nov 2022
In modern cybersecurity, it's not just about what's inside your network—it's about what's exposed to the outside world. With the proliferation of cloud services, third-party integrations, and remote work setups, your organization's external attack surface has grown exponentially. Traditional security…
EASM
01 Apr 2021
As organizations adopt cloud services, remote work, third-party integrations, and digital transformation initiatives, their IT environments have become increasingly complex—and increasingly visible to attackers. Every exposed web server, misconfigured cloud bucket, forgotten subdomain, or unsecured API becomes a doorway that…
Application Security
21 Feb 2020
Hackers are using the 'Reaver' tool to exploit the WiFi Protected Setup (WPS) feature found on many WiFi routers and access points. This method involves remotely brute-forcing the WPS handshaking process to potentially crack a WPA network. Most networks will…