Smartphone vulnerabilities?

Do the feeds scan smartphones for vulnerabilities?
External scan and internal scan?
These can be footholds to attack a network.

Hi there,

All hosts are treated equally.
It doesn’t matter what architecture the host is.

Happy scanning,

Chris

2 Likes

Aha! :slight_smile:, – hier steht jetzt mehr dazu: How do the scanners work?