top of page
Search


May 9, 20232 min read
Log4j Vulnerability: The Persistent Threat Amplified by Widespread Usage in Programming Libraries
Log4j Vulnerability
18 views0 comments


Dec 20, 20212 min read
Common types of attacks: Cross-site scripting and SQL Injection
Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks allow attackers to...
33 views0 comments


Dec 2, 20212 min read
When should my company perform a pentest?
A penetration test, is an authorized simulated cyber attack on a computer system, performed to assess the security of the system. The UK...
30 views0 comments
bottom of page