This vulnerability can allow an attacker to gain complete control over entire systems if...
At Holm Security, we provide solutions for vulnerability assessment. In meetings with our...
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...
According to Stefan Thelberg, security expert and CEO at Holm Security, the 1177 leak could have easily been avoided if basic security measures had been in...
1. Simply a Programming Error? If you get a developer to set up a back door. It can be so subtle, you might mistake it for a programming error. Occasionally,...
Holm Security discovered a vulnerability in EPiServer’s SiteSeeker product. The vulnerability means that JavaScript in affected web pages can be modified to...