Identifying vulnerabilities Tego Cyber is committed to ensuring that our products are safe, secure and designed with security in mind from the very beginning. As our technology changes and evolves, our internal security team and third party penetration testers are constantly testing to find vulnerabilities.
Security Advisories Security Advisories will be available on our website and will contain the following details: Severity (based on CVSS score system v3.1) CVE ID number A description of the vulnerability Components affected (e.g. Threat Intelligence Feeds, Threat Correlation Engine) Versions of affected software Any mitigations If the vulnerability is being actively exploited The fix version of software Vulnerability Reporter