

The Cyber Resilience Act (CRA) is the first regulation of its kind globally, making...
There’s a lot of buzz about AI these days. This is not that strange, as AI is a...
2024 was another very successful year for Holm Security. We made significant product...
There's a lot of buzz around SOCs At Holm Security, we meet with thousands of organizations every year. A clear trend is that more and more organizations are...
A constantly growing challenge in an evolving threat landscape Today, technological advancements and digitalization introduce new challenges and a constantly...
Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS and NIS2, you will soon understand that a proactive cyber defense is...
Understanding the Vulnerability: A Memory Issue in Chrome The identified vulnerability (CVE-2024-4671) is classified as high-severity and has a CVSS v3.1 score...
Understanding the Vulnerability CVE-2024-3400 Tracked as CVE-2024-3400 and rated with the maximum CVSS score of 10.0, this is a command injection vulnerability...
Understanding the Vulnerabilities CVE-2024-1708 This is a path-traversal vulnerability with a CVSS score of 8.4 affecting ScreenConnect 23.9.7 and earlier,...