Cybersecurity - DEEP
Cybersecurity
Cybersecurity: peace of mind with the DEEP SOC
Using a Security Operations Centre (SOC) allows organisations to constantly monitor activity on their IT systems so as to take quick and effective action in the event of an attack or anomaly.
Read this articlePublished on
12 July 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART1: controlling the instruction pointer
Find out how to take advantage of the whole underflow vulnerability on Firefox 56 and 57
Read this articlePublished on
04 July 2022
Simulate attacks on telecom networks to better protect them
Telecoms networks are the target of increasingly frequent attacks by malicious actors seeking to hijack them or intercept communications.
Read this articlePublished on
19 April 2022
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?