April 9, 2024
Enhanced Vulnerability Management Guide Using Open-Source Tools
In the dynamic world of IT security, proactive…
March 12, 2024
Good practices in Cybersecurity – Part 2
Nowadays, we can distinguish various branches within a…
February 15, 2024
Good practices in Cybersecurity – Part 1
Pentesters use a comprehensive and complete toolkit to…
December 7, 2023
First steps in cybersecurity: scan your domain
Pentesters use a comprehensive and complete toolkit to…
November 27, 2023
Visualize findings and get a deeper understanding of your security posture
Our risk scoring system goes beyond mere criticality…