What are Weak Hashing Algorithms
In your vulnerability scanner of choice you may have seen “SSL Certificate signed using weak hashing algorithm”, but what is this? This refers to a security vulnerability in the SSL/TLS certificate used by a website. A hashing algorithm is used...
Attack Surface Management
Introduction External attack surface management (ASM) refers to the process of identifying, analyzing, and mitigating security risks and vulnerabilities that originate from outside an organization’s network. The focus of external ASM is to protect against threats such as hackers, cybercriminals,...
