Vulnerability Scanning Vs. Penetration Testing

What Is Vulnerability Scanning? Vulnerability Scanning is an automated process of identifying network, application, and security vulnerabilities. Vulnerability scanning is performed by the technology department of an organization or a third-party service provider. Vulnerability scanners […]

Read More

Top Five Exploited Vulnerabilities By Chinese State-Sponsored Actors

Top Five Exploited Vulnerabilities By Chinese State-Sponsored Actors

Back on October 20, 2020, the United States National Security Agency (NSA) published a cybersecurity advisory about Chinese state-sponsored malicious cyber activity. This post we will be covering 5 of those vulnerabilities. “Since these techniques include exploitation […]

Read More