San Francisco: +1 (415) 635 3784  |  Geneva: +41 (22) 723 2424   |  
ImmuniWeb®: Login | Register
ImmuniWeb® by High-Tech Bridge

Stay in touch

Enter your email and get the latest news and researches on cybersecurity, receive invitations to private security events and conferences.

High-Tech Bridge Security Research

High-Tech Bridge devotes significant internal resources to continuous security research. Some of the security studies we perform are regularly published in our blog. Vulnerabilities that our security researchers discover almost every week, help software vendors to improve security and reliability of their products. Above 300 large vendors fixed security vulnerabilities thanks to High-Tech Bridge Security Research Lab, including Microsoft, IBM, Novell, McAfee, Sony, HP, Samsung, PHP, OpenOffice, Corel, WordPress, Joomla, OpenX, SugarCRM, MantisBT, e107, MODX, Bitrix and many others.

High-Tech Bridge Security Research Lab
540 Security Advisories
345 Vendors
Released Patches
1050 Vulnerabilities

Patch Available Upon Disclosure

2014 Q3 100%
2014 Q2 92%
2014 Q1 94%
2013 Q4 89%
2013 Q3 92%
2013 Q2 100%

Vendor Average Time to Patch

2014 Q3 21 days
2014 Q2 18 days
2014 Q1 12 days
2013 Q4 8 days
2013 Q3 13 days
2013 Q2 30 days
High-Tech Bridge Security Advisories are CVE Compatible High-Tech Bridge Security Advisories CWE Compatibility High-Tech Bridge Security Advisories CVSS Adopters

Security Blog

Can you trust SSL encryption of your email provider? December 1, 2015
Have you ever though how secure and reliable is your SSL/TLS connection to your email servers? A brief research about encryption implementation of the most popular free email providers.

Spending millions on APT defense? Don’t forget about Third Party Risk Management November 9, 2015
Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

Can we trust our HTTPS connections to the largest global companies? October 28, 2015
How efficiently do the Global 2000 companies protect our data between their web servers and our computers or mobiles?

DDoS attacks: a perfect smoke screen for APTs and silent data breaches October 12, 2015
Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.

How to secure the Internet of Things and who should be liable for it? October 6, 2015
How to secure connected devices before it will be too late?