Young hacker smiling

We hack your software

zero false positives

Expert intelligence + effective automation

Vulnerability disclosure

Vulnerability disclosure ecosystem

Responsible vulnerability disclosure

An information security vulnerability is a flaw or a weakness in a system or application that a malicious attacker could exploit and result in a compromise of the confidentiality, integrity or availability of both software and hardware systems. We as Security Testers (or pentesters, white hat hackers) find every day …



Blank CSV document icon

LibSSH new Vulnerability

New vulnerability on libssh CVE-2018-10933

The new vulnerability in LibSSH, tracked as CVE-2018-10933, resides on the server code which can enable a client to bypass the authentication process and create channels without permissions, this affects servers using versions 0.6 and above being used in server mode. The bug was discovered by Peter Winter-Smith of …



Person working on the computer while looking at cellphone

Delimiting an Ethical Hacking

How to define the scope of your objectives

The main problem encountered by an organization when they need to perform an Ethical Hacking is to establish the boundaries of the hacking. Delimiting the scope of an Ethical Hacking by time is a common mistake since it is not possible to know when the hacking, that is measured solely …



Service status - Terms of Use