Search

ProHacktive
All the questions you have about the company

The product range
Find out about the ProHacktive range of enclosures and how to use them

Installation / Troubleshooting
All the questions you have to install and troubleshoot your Sherlock solution

Sherlock
How the permanent audit tool works in your infrastructure

The interface
How the application embedded in the Sherlock boxes works

KB Project
Knowledge base: using the multi-language vulnerability database

Lexique :
The Cring ransomware made headlines as the threat was used in an attack that exploited a bug in the 11-year-old version of Adobe ColdFusion 9 software, the first recorded incident involving the use of...