EASM
01 Apr 2021
A relatively new cybersecurity problem space with its own definition has been coined since a few years now: Attack Surface Management or ASM. The term can be confusing or vague without spending some time on a clear definition. In cybersecurity…
Application Security
21 Feb 2020
Hackers are using the 'Reaver' tool to exploit the WiFi Protected Setup (WPS) feature found on many WiFi routers and access points. This method involves remotely brute-forcing the WPS handshaking process to potentially crack a WPA network. Most networks will…
EASM
24 Sep 2019
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied or abused. In many cases the law cannot help as the attacker cannot be identified. The problem of fake websites is…
EASM
06 Feb 2018
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an old college colleague, our teenage niece or that guy on Facebook we don’t really know exposing half of their life…