Category: Vulnerability Scanning

microsoft exchange vulnerabilities

Cyber Actors Exploiting MS Exchange Vulnerability

We are currently observing a high volume of incidents related to Microsoft Exchange proxy logon vulnerabilities related to the following…

Read post
network vulnerability assessment

Internal Network Vulnerability Assessment

FRSecure internal vulnerability assessments determine whether your network is reasonably protected from threats, and if your systems and processes can…

Read post