Visit our Business blog


0 0 20

Cookies are delicious

XSS in IceWarp Webmail – CVE-2017-7855

In my latest post, I am going to run through my process of identifying XSS in IceWarp...

Read More…

1 0 23

Six steps to basic enterprise patch management

Hackers, crackers, phreaks, script kiddies, malware developers. These are the threats that all of us internet users have to deal with on...

Read More…

1 0 33

Don't be paranoid, just be aware

One of my favorite stories involves an onsite Red Team Assessment (Social Engineering and Physical Assessment) that started off by...

Read More…

0 0 15

Setting up effective intrusion prevention rules

Martin Roesch needed something quick and easy to look at data packets as they were going across the wire. In 1998, he created Snort, a...

Read More…

0 0 170

The seven rules of threat intelligence club

Welcome to Fight Club.

The first rule of Fight Club is: you do not talk about Fight Club.

The second rule of Fight Club is: you DO NOT...

Read More…

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.