Image

April 02, 2018
Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This....
Blog
April 02, 2018
Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This....
Blog
May 02, 2017
Manage the security lifecycle of all in-house developed and acquired software in order to prevent, detect and correct security weaknesses.
Blog