Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Insyde Software is a leading worldwide provider of UEFI firmware, OpenBMC-based systems management solutions, and custom engineering services for companies in the mobile, server, desktop and IoT (Internet-of-Things) computing industries. The company is publicly held (6231.TWO) and headquartered in Taipei, Taiwan with U.S. headquarters in Westborough, MA. The company’s customers include the world’s leading client computing, IoT communications and datacenter server designers and manufacturers.

Insyde Software A.I CyberSecurity Scoring

Insyde Software

Company Details

Linkedin ID:

insyde-software

Employees number:

322

Number of followers:

1,929

NAICS:

5112

Industry Type:

Software Development

Homepage:

insyde.com

IP Addresses:

0

Company ID:

INS_3282987

Scan Status:

In-progress

AI scoreInsyde Software Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/insyde-software.jpeg
Insyde Software Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreInsyde Software Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/insyde-software.jpeg
Insyde Software Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Insyde Software Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Insyde SoftwareVulnerability10056/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Critical UEFI Flaw (CVE-2025-3052) Exposes Systems to Bootkit Attacks A newly disclosed memory corruption vulnerability in UEFI firmware, tracked as CVE-2025-3052, allows threat actors to bypass Secure Boot and deploy bootkit malware. Discovered by Binarly researchers, the flaw stems from a certificate-signed module that can be exploited by attackers with admin-level OS privileges to manipulate a user-writable NVRAM variable, enabling arbitrary data writes during the UEFI boot process. Microsoft initially believed the issue affected only a single module but later confirmed 14 vulnerable modules during triage. The company released patches on June 10, 2025, as part of its Patch Tuesday updates, adding 14 new hashes to the dbx (Secure Boot Forbidden Signature Database) to block exploitation. In a related development, cybersecurity researcher Nikolaj Schlej revealed that Insyde H2O-based UEFI firmware was also impacted by a separate Secure Boot bypass flaw (CVE-2025-4275), dubbed Hydrophobia, which the vendor has since remediated. The discovery underscores ongoing risks in UEFI firmware security, where vulnerabilities can persist across multiple implementations.

Insyde Software: Bootkit malware injection possible with novel Secure Boot vulnerability
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Critical UEFI Flaw (CVE-2025-3052) Exposes Systems to Bootkit Attacks A newly disclosed memory corruption vulnerability in UEFI firmware, tracked as CVE-2025-3052, allows threat actors to bypass Secure Boot and deploy bootkit malware. Discovered by Binarly researchers, the flaw stems from a certificate-signed module that can be exploited by attackers with admin-level OS privileges to manipulate a user-writable NVRAM variable, enabling arbitrary data writes during the UEFI boot process. Microsoft initially believed the issue affected only a single module but later confirmed 14 vulnerable modules during triage. The company released patches on June 10, 2025, as part of its Patch Tuesday updates, adding 14 new hashes to the dbx (Secure Boot Forbidden Signature Database) to block exploitation. In a related development, cybersecurity researcher Nikolaj Schlej revealed that Insyde H2O-based UEFI firmware was also impacted by a separate Secure Boot bypass flaw (CVE-2025-4275), dubbed Hydrophobia, which the vendor has since remediated. The discovery underscores ongoing risks in UEFI firmware security, where vulnerabilities can persist across multiple implementations.

Ailogo

Insyde Software Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Insyde Software

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Insyde Software in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Insyde Software in 2026.

Incident Types Insyde Software vs Software Development Industry Avg (This Year)

No incidents recorded for Insyde Software in 2026.

Incident History — Insyde Software (X = Date, Y = Severity)

Insyde Software cyber incidents detection timeline including parent company and subsidiaries

Insyde Software Company Subsidiaries

SubsidiaryImage

Insyde Software is a leading worldwide provider of UEFI firmware, OpenBMC-based systems management solutions, and custom engineering services for companies in the mobile, server, desktop and IoT (Internet-of-Things) computing industries. The company is publicly held (6231.TWO) and headquartered in Taipei, Taiwan with U.S. headquarters in Westborough, MA. The company’s customers include the world’s leading client computing, IoT communications and datacenter server designers and manufacturers.

Loading...
similarCompanies

Insyde Software Similar Companies

Daraz

Founded in 2015, Daraz is the leading e-commerce platform in South Asia with operations in Pakistan, Bangladesh, Sri Lanka, Nepal, and Myanmar. It provides sellers and consumers with cutting-edge marketplace technology, targeting a rapidly growing region of over 500 million people. By building an in

Snowflake

Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite their siloed data, easily discover and securely share governed data, and execute diverse analy

HubSpot

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

Rakuten

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Cadence

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic

Lazada

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

IDEMIA

IDEMIA Secure Transactions (IST) is a leading provider of payment, connectivity, and cybersecurity solutions, serving billions of people worldwide. With decades of expertise in cryptography and credential issuance, IST is trusted by over 2000 financial institutions, mobile operators, automotive manu

Tencent

Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

newsone

Insyde Software CyberSecurity News

June 11, 2025 07:00 AM
UEFI Vulnerability in Insyde Allows Digital Certificate Injection Through NVRAM Variable

A critical security vulnerability in Insyde H2O UEFI firmware has been discovered that allows attackers to inject malicious digital certificates through an...

April 28, 2025 07:00 AM
Taiwan stock market regains 20,000-point mark

Cybersecurity and biotech sectors power market rally | Apr. 28, 2025 19:54.

January 23, 2025 08:00 AM
Critical Palo Alto Firewall Vulnerabilities Let Hackers Bypass Secure Boot & Exploit Firmware

A recent cybersecurity report has identified critical vulnerabilities in Palo Alto Networks firewall devices that could enable attackers to bypass Secure Boot...

January 23, 2025 08:00 AM
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices' firmware.

October 10, 2022 07:00 AM
Intel confirms the leak of Alder Lake BIOS source code

Intel confirms the source code leak for UEFI BIOS of Alder Lake CPU. Cybersecurity researchers have many concerns following the confirmation...

October 10, 2022 07:00 AM
Intel Confirms Leak of Alder Lake BIOS Source Code

Intel has confirmed that proprietary source code related to its Alder Lake CPUs has been leaked after it was posted on 4chan and GitHub by...

March 22, 2022 07:00 AM
New Dell BIOS Bugs Affect Millions of Inspiron, Vostro, XPS, Alienware Systems

A set of newly disclosed critical vulnerabilities in Dell BIOS software affect millions of Edge, Inspiron, Vostro, XPS, Latitude and...

February 02, 2022 08:00 AM
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors

As many as 23 new high severity security vulnerabilities have been disclosed in different implementations of UEFI firmware used by numerous...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Insyde Software CyberSecurity History Information

Official Website of Insyde Software

The official website of Insyde Software is https://www.insyde.com.

Insyde Software’s AI-Generated Cybersecurity Score

According to Rankiteo, Insyde Software’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Insyde Software’ have ?

According to Rankiteo, Insyde Software currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Insyde Software been affected by any supply chain cyber incidents ?

According to Rankiteo, Insyde Software has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Insyde Software have SOC 2 Type 1 certification ?

According to Rankiteo, Insyde Software is not certified under SOC 2 Type 1.

Does Insyde Software have SOC 2 Type 2 certification ?

According to Rankiteo, Insyde Software does not hold a SOC 2 Type 2 certification.

Does Insyde Software comply with GDPR ?

According to Rankiteo, Insyde Software is not listed as GDPR compliant.

Does Insyde Software have PCI DSS certification ?

According to Rankiteo, Insyde Software does not currently maintain PCI DSS compliance.

Does Insyde Software comply with HIPAA ?

According to Rankiteo, Insyde Software is not compliant with HIPAA regulations.

Does Insyde Software have ISO 27001 certification ?

According to Rankiteo,Insyde Software is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Insyde Software

Insyde Software operates primarily in the Software Development industry.

Number of Employees at Insyde Software

Insyde Software employs approximately 322 people worldwide.

Subsidiaries Owned by Insyde Software

Insyde Software presently has no subsidiaries across any sectors.

Insyde Software’s LinkedIn Followers

Insyde Software’s official LinkedIn profile has approximately 1,929 followers.

NAICS Classification of Insyde Software

Insyde Software is classified under the NAICS code 5112, which corresponds to Software Publishers.

Insyde Software’s Presence on Crunchbase

Yes, Insyde Software has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/insyde-software.

Insyde Software’s Presence on LinkedIn

Yes, Insyde Software maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/insyde-software.

Cybersecurity Incidents Involving Insyde Software

As of January 21, 2026, Rankiteo reports that Insyde Software has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Insyde Software has an estimated 28,138 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Insyde Software ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Insyde Software detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with binarly researchers, and containment measures with application of microsoft's patch tuesday fixes (june 10, 2025), and remediation measures with updated dbx with 14 new hashes to block vulnerable modules..

Incident Details

Can you provide details on each incident ?

Incident : Secure Boot Bypass

Title: UEFI Secure Boot Bypass via CVE-2025-3052 Memory Corruption Flaw

Description: Attacks involving the UEFI certificate-signed module memory corruption flaw, tracked as CVE-2025-3052, could enable the circumvention of Secure Boot and eventual injection of bootkit malware. Threat actors with admin operating system privileges could alter the vulnerable utility's user-writable NVRAM variable to facilitate in-memory writing of arbitrary data during the UEFI boot process. The vulnerability affected 14 different modules, and fixes were released by Microsoft on June 10, 2025.

Date Resolved: 2025-06-10

Type: Secure Boot Bypass

Attack Vector: Memory corruption in UEFI module

Vulnerability Exploited: CVE-2025-3052

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Secure Boot Bypass INS1768378515

Systems Affected: UEFI firmware, Secure Boot process

Operational Impact: Potential bootkit malware injection

Which entities were affected by each incident ?

Incident : Secure Boot Bypass INS1768378515

Entity Type: Organizations and users with vulnerable UEFI firmware

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Secure Boot Bypass INS1768378515

Third Party Assistance: Binarly researchers

Containment Measures: Application of Microsoft's Patch Tuesday fixes (June 10, 2025)

Remediation Measures: Updated dbx with 14 new hashes to block vulnerable modules

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Binarly researchers.

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Updated dbx with 14 new hashes to block vulnerable modules.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by application of microsoft's patch tuesday fixes (june 10 and 2025).

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Secure Boot Bypass INS1768378515

Recommendations: Immediately apply the issued fixes for CVE-2025-3052 to prevent Secure Boot bypass and bootkit malware injection.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Immediately apply the issued fixes for CVE-2025-3052 to prevent Secure Boot bypass and bootkit malware injection..

References

Where can I find more information about each incident ?

Incident : Secure Boot Bypass INS1768378515

Source: BleepingComputer

Incident : Secure Boot Bypass INS1768378515

Source: Binarly researchers

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Binarly researchers.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Secure Boot Bypass INS1768378515

Root Causes: Memory corruption flaw in UEFI certificate-signed module (CVE-2025-3052) allowing NVRAM variable manipulation

Corrective Actions: Patch vulnerable UEFI modules and update dbx with new hashes

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Binarly researchers.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch vulnerable UEFI modules and update dbx with new hashes.

Additional Questions

Incident Details

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2025-06-10.

Impact of the Incidents

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Binarly researchers.

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Application of Microsoft's Patch Tuesday fixes (June 10 and 2025).

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Immediately apply the issued fixes for CVE-2025-3052 to prevent Secure Boot bypass and bootkit malware injection..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are BleepingComputer and Binarly researchers.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=insyde-software' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge