Vulnerability Scanning –
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing –
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite. […]
Security researchers are discovering serious vulnerabilities in the Mac OS X system. Even though we have not seen specific malware to exploit these vulnerabilities, they do exist in the labs and technical papers as proof of concepts. […]