Introduction
Introduction Statistics Contact Development Disclaimer Help
Post Axu5O13NBkeGJ3EMwy by [email protected]
More posts by [email protected]
Post #Axu3vead0x2qZehJOS by [email protected]
0 likes, 1 repeats
Oh no. They’re pushing me to do vulnerability management at work. I’m going…
Post #Axu5O0xLY9pO0MPYYa by [email protected]
0 likes, 0 repeats
@curiousrobot just skip the detection & email everyone at the company at Tu…
Post #Axu5O13NBkeGJ3EMwy by [email protected]
0 likes, 0 repeats
@nyanbinary What if they don’t have any advisories and everything is ad-hoc a…
Post #Axu5O19ko1kicqDStc by [email protected]
0 likes, 1 repeats
@curiousrobot ah well, for us it's what makes it into the online IT magazin…
Post #AyAz7dVvdx8Sd3iF3Q by [email protected]
0 likes, 0 repeats
@nyanbinary Definitely! Why hire a whole team of cyber intelligence analyats wh…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.