End-Of Life Software

All software goes through a support cycle, starting at mainstream support, extended support and finally “End of Life”. When software is in mainstream support, provider regularly releases features and provides security updates for any bugs that are present. This support usually occurs when the software is first released and continues for the longest duration. In[…]

Bug Bounty

Open-Source Penetration Testing

With the enormous rise in Cyber Security threats online, many companies are at threat of their online databases being targeted and breached or are even susceptible to attackers defacing their website or using it to compromise visitors’ devices by using the website as a platform to deploy malicious software. This increase in online threats has[…]