Smartphone vulnerabilities?

Do the feeds scan smartphones for vulnerabilities?
External scan and internal scan?
These can be footholds to attack a network.

Hi there,

All hosts are treated equally.
It doesn’t matter what architecture the host is.

Happy scanning,

Chris

2 Likes