Horangi

Horangi News & Insights

There is no off switch on a Tiger

QuanHeng Lim

Latest stories

Cybersecurity in the Healthcare Industry

Between the 27th of June and the 4th of July, Singapore experienced its biggest and most serious cyberattack to date.

Pentesting Methodology 101

Penetration testing is an authorized simulation of an attack on a system, network, or application to find potential vulnerabilities that can be exploited.

Real Life Examples Of Web Vulnerabilities (Revised with OWASP 2017)

 Since the previous review of web vulnerabilities mapped to the OWASP Top 10 previously published on Apr 10, 2017, the awareness document has been updated to reflect the current risk trends related to web applications. This document is meant as a...

Real Life Examples Of Web Vulnerabilities

Knowing the common web vulnerabilities is great, but often it is hard to think of specific examples that appear in popular news to show the layman the relevance of these issues.

Month in Review Feb 2018

1. The counterfeit code-signing ceritifcates are now being custom-created

Website

Horangi

Visit our support center and talk to our experts about your security issues, questions and needs.

Join the conversation
Become the tiger of your mountain with our full-spectrum cyber security services.

Become the tiger of your mountain with our full-spectrum cyber security services.

Learn more