BLOG

We simplify vulnerability assessment and patch management to secure your company.

  • All
  • Cyberssecurity

European Parliament Approves NIS2 Directive – Are You Prepared?

NIS2 introduces significant changes, policies, and strategic responses to the European cyber security landscape. Once enacted, member states have up to 21 months to reform their national cybersecurity laws in line with the NIS2. In other words, European companies that fall within NIS2’s provision must prepare themselves for the new reforms by 2024.

Read More →

Cisco Warns of AnyConnect Vulnerability Exploitations

A high-risk vulnerability, filed under CVE-2020-3433, allows hijackers to launch DLL attacks after gaining access to the targeted device. A DLL attack involves injecting malicious codes into the DLL files, which the applications will load at run time.

Read More →

Top Vulnerabilities That Jeopardize Your Company’s Security

The apps and programs run by your company can expose you to common vulnerabilities that can jeopardize your cyber security. This makes it critical that you understand the common sources of vulnerabilities, preventive measure and perhaps a remediation tool to secure your company.

Read More →

European Parliament Approves NIS2 Directive – Are You Prepared?

NIS2 introduces significant changes, policies, and strategic responses to the European cyber security landscape. Once enacted, member states have up to 21 months to reform their national cybersecurity laws in line with the NIS2. In other words, European

Read More

Cisco Warns of AnyConnect Vulnerability Exploitations

A high-risk vulnerability, filed under CVE-2020-3433, allows hijackers to launch DLL attacks after gaining access to the targeted device. A DLL attack involves injecting malicious codes into the DLL files, which the applications will load at run

Read More

Top Vulnerabilities That Jeopardize Your Company’s Security

The apps and programs run by your company can expose you to common vulnerabilities that can jeopardize your cyber security. This makes it critical that you understand the common sources of vulnerabilities, preventive measure and perhaps a remediation tool to

Read More

We use cookies to give the user the best experience possible. By using our site you accept the use of cookies.