blog.xint.io Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: http://blog.xint.io/
Effective URL: https://blog.xint.io/?gi=8503a559213f
Submission: On October 30 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



XINT BLOG


BREAK SILOS, ACHIEVE VISIBILITY


Industry InsightsProduct NewsWebsite
FollowFollowing
Top 5 Features Your ASM Solution Must Have
TOP 5 FEATURES YOUR ASM SOLUTION MUST HAVE

So you know what ASM is and why you need it — but which features are crucial?
Here’s the run down.
Xint
Oct 23
Offensive Security with Large Language Models (2)
OFFENSIVE SECURITY WITH LARGE LANGUAGE MODELS (2)

How LLMs are changing the game for static analysis — especially when source code
is available.
Xint
Sep 29
Offensive Security with Large Language Models (1)
OFFENSIVE SECURITY WITH LARGE LANGUAGE MODELS (1)

Applications of larage language models in offensive security
Xint
Sep 26
Top Penetration Testing Solutions for IT Security: 2024 Guide
TOP PENETRATION TESTING SOLUTIONS FOR IT SECURITY: 2024 GUIDE

The top 7penetration testing tools of 2024 for hackers and for businesses.
Xint
Sep 10
Offensive Security vs. Defensive Security: Navigating the Two Pillars of
Cybersecurity
OFFENSIVE SECURITY VS. DEFENSIVE SECURITY: NAVIGATING THE TWO PILLARS OF
CYBERSECURITY

Explore how offensive and defensive security strategies work together to protect
against cyber threats.
Xint
Aug 30
Behind the Padlock: The Essential Guide to SSL/TLS Certificates
BEHIND THE PADLOCK: THE ESSENTIAL GUIDE TO SSL/TLS CERTIFICATES

What are SSL and TLS certificates? Find out how these encryption communication
protocols protect your sensitive data online.
Xint
Jul 31
Theori Threat Report: Top 6 Cybersecurity Incidents of the First Half of 2024
THEORI THREAT REPORT: TOP 6 CYBERSECURITY INCIDENTS OF THE FIRST HALF OF 2024

Discover how 2024’s top security incidents — from ransomware takedowns to
sophisticated backdoors — are reshaping the cybersecurity field.
Xint
Jul 17
About Xint BlogLatest StoriesArchiveAbout MediumTermsPrivacyTeams