Skip to content

Security

Categories

Sort

360 results found

Hacking Demo #2 Command & Control

This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection...

Hacking Demo #1 Mail Infection

This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface