Ecoer Logo

@secpoint

49

SecPoint Cyber Security

steemit.com/@secpoint
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS98.16%
REPUTATION PROGRESS16.04%
Net Worth
5.819USD
STEEM
2.660STEEM
SBD
9.397SBD
Own SP
19.229SP

Detailed Balance

STEEM
balance
0.758STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
1.902STEEM
STEEM POWER
Own SP
19.229SP
Delegated Out
0.000SP
Delegation In
0.000SP
Effective Power
19.229SP
Reward SP (pending)
2.818SP
SBD
sbd_balance
9.153SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.244SBD
{
  "balance": "0.758 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "1.902 STEEM",
  "vesting_shares": "31311.650407 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "sbd_balance": "9.153 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.244 SBD",
  "conversions": []
}

Account Info

namesecpoint
id63334
rank77,297
reputation483596708095
created2016-08-14T15:56:24
recovery_accountsteem
proxyNone
post_count959
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2026-05-20T15:40:39
last_root_post2026-05-20T15:40:39
last_vote_time2018-02-28T10:23:15
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power9,800
delayed_votes0
balance0.758 STEEM
savings_balance0.000 STEEM
sbd_balance9.153 SBD
savings_sbd_balance0.000 SBD
vesting_shares31311.650407 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares0.000000 VESTS
reward_vesting_balance5447.331217 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update2023-03-01T06:55:18
minedNo
sbd_seconds0
sbd_last_interest_payment2018-10-22T20:23:18
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 63334,
  "name": "secpoint",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM722dzjtn8bxMmiBwWJu2j7KanrcMdc2WZK8voFLwsoLaKQJApd",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM73Q7RTSGgZGftqxxoDEyTjeHcnuVwxXTsmRdrtDS678Ro6FA2r",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [
      [
        "dlive.app",
        1
      ]
    ],
    "key_auths": [
      [
        "STM7itcM9pWTWPADnh2Xoe39SDqnaeuYuz9iKYiM3aDhr2tCp395X",
        1
      ]
    ]
  },
  "memo_key": "STM7qk6kNQy64S9rCVKrgvYzxg4VNPcvfXvx2nX7TDjBwNWAQG885",
  "json_metadata": "{\"profile\":{\"profile_image\":\"https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png\",\"name\":\"secpoint\",\"about\":\"SecPoint Cyber Security\",\"location\":\"Copenhagen, Denmark\",\"website\":\"https://www.secpoint.com\",\"dtube_pub\":\"mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW\",\"cover_image\":\"https://cdn.steemitimages.com/DQmYh6kbrEVx2WrnhTAKJBGDYR54JMKRses989uNsZpj8Ky/COVER%20dtubesteemit2.png\"}}",
  "posting_json_metadata": "{\"profile\":{\"profile_image\":\"https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png\",\"name\":\"secpoint\",\"about\":\"SecPoint Cyber Security\",\"location\":\"Copenhagen, Denmark\",\"website\":\"https://www.secpoint.com\",\"dtube_pub\":\"mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW\",\"cover_image\":\"https://cdn.steemitimages.com/DQmZr1xaTSkumTuvog1Z9bChy1ZPfaxAENVfb2s485PvgaH/Banner-Facebook.jpeg\",\"version\":2}}",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "2023-03-01T06:55:18",
  "created": "2016-08-14T15:56:24",
  "mined": false,
  "recovery_account": "steem",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 959,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": 9800,
    "last_update_time": 1519813395
  },
  "downvote_manabar": {
    "current_mana": 0,
    "last_update_time": 1471190184
  },
  "voting_power": 9800,
  "balance": "0.758 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "9.153 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "2018-10-22T20:23:18",
  "sbd_last_interest_payment": "2018-10-22T20:23:18",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.244 SBD",
  "reward_steem_balance": "1.902 STEEM",
  "reward_vesting_balance": "5447.331217 VESTS",
  "reward_vesting_steem": "2.818 STEEM",
  "vesting_shares": "31311.650407 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 24941,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2026-05-20T15:40:39",
  "last_root_post": "2026-05-20T15:40:39",
  "last_vote_time": "2018-02-28T10:23:15",
  "post_bandwidth": 10000,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": "483596708095",
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 77297
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
2026/05/20 15:40:39
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-will-be-at-eurosatory-2026-in-paris-from-15-to-19-june-as-part-of-the-danish-pavilion
titleSecPoint will be at Eurosatory 2026 in Paris from 15 to 19 June as part of the Danish Pavilion.
body![SecPoint-EUROSATORY-2026-1.png](https://cdn.steemitimages.com/DQmapBg5ekPGiS3QV4z21e7q4fXrVMavn3yKQ244FWbptcr/SecPoint-EUROSATORY-2026-1.png) SecPoint will be at Eurosatory 2026 in Paris from 15 to 19 June as part of the Danish Pavilion. Come visit us at the Danish Pavilion, organized by DI Danish Defence and Security Industries, in Hall 6, Stand J146, and meet SecPoint to discuss trusted European cybersecurity for defence, public sector, critical infrastructure, and security-focused organizations. We will present how the SecPoint Penetrator vulnerability scanner and SecPoint Protector UTM Firewall help organizations strengthen cyber resilience with on-premises privacy control, dark web intelligence, vulnerability scanning, compliance profiles, intrusion prevention, Geo-IP threat intelligence, and practical protection against hostile infrastructure. You can also get a signed copy of our new book: “HOW THEY HACK YOU?!” Eurosatory 2026 has a strong focus on modern defence and security challenges, including cyber, space, AI, emerging digital challenges, crisis management, and industrial resilience, making it a highly relevant meeting point for SecPoint and our partners. We look forward to meeting defence organizations, system integrators, distributors, VARs, VADs, MSPs, and technology partners who want strong European cybersecurity capabilities. Book a meeting with SecPoint before the show, or stop by the Danish Pavilion in Paris. To see more about Eurosatory please visit https://www.eurosatory.com #SecPoint #Eurosatory2026 #CyberSecurity #DefenceIndustry #DanishDefence
json metadata{"tags":["secpoint","cybersecurity","eurosatory2026","defenceindustry","danishdefence"],"image":["https://cdn.steemitimages.com/DQmapBg5ekPGiS3QV4z21e7q4fXrVMavn3yKQ244FWbptcr/SecPoint-EUROSATORY-2026-1.png"],"links":["https://www.eurosatory.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #106219259/Trx cf7c1cc73a21dcb02a03817cf71571c79d74dbe8
View Raw JSON Data
{
  "trx_id": "cf7c1cc73a21dcb02a03817cf71571c79d74dbe8",
  "block": 106219259,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-20T15:40:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-will-be-at-eurosatory-2026-in-paris-from-15-to-19-june-as-part-of-the-danish-pavilion",
      "title": "SecPoint will be at Eurosatory 2026 in Paris from 15 to 19 June as part of the Danish Pavilion.",
      "body": "![SecPoint-EUROSATORY-2026-1.png](https://cdn.steemitimages.com/DQmapBg5ekPGiS3QV4z21e7q4fXrVMavn3yKQ244FWbptcr/SecPoint-EUROSATORY-2026-1.png)\nSecPoint will be at Eurosatory 2026 in Paris from 15 to 19 June as part of the Danish Pavilion.\n\nCome visit us at the Danish Pavilion, organized by DI Danish Defence and Security Industries, in Hall 6, Stand J146, and meet SecPoint to discuss trusted European cybersecurity for defence, public sector, critical infrastructure, and security-focused organizations.\n\nWe will present how the SecPoint Penetrator vulnerability scanner and SecPoint Protector UTM Firewall help organizations strengthen cyber resilience with on-premises privacy control, dark web intelligence, vulnerability scanning, compliance profiles, intrusion prevention, Geo-IP threat intelligence, and practical protection against hostile infrastructure.\n\nYou can also get a signed copy of our new book: “HOW THEY HACK YOU?!”\n\nEurosatory 2026 has a strong focus on modern defence and security challenges, including cyber, space, AI, emerging digital challenges, crisis management, and industrial resilience, making it a highly relevant meeting point for SecPoint and our partners.\n\nWe look forward to meeting defence organizations, system integrators, distributors, VARs, VADs, MSPs, and technology partners who want strong European cybersecurity capabilities.\n\nBook a meeting with SecPoint before the show, or stop by the Danish Pavilion in Paris.\n\nTo see more about Eurosatory please visit https://www.eurosatory.com\n\n#SecPoint #Eurosatory2026 #CyberSecurity #DefenceIndustry #DanishDefence",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"eurosatory2026\",\"defenceindustry\",\"danishdefence\"],\"image\":[\"https://cdn.steemitimages.com/DQmapBg5ekPGiS3QV4z21e7q4fXrVMavn3yKQ244FWbptcr/SecPoint-EUROSATORY-2026-1.png\"],\"links\":[\"https://www.eurosatory.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/19 10:50:42
parent author
parent permlinksecpoint
authorsecpoint
permlinkscan-for-possible-exposure-indicators-related-to-nginx-rift-cve-2026-42945-with-the-secpoint-penetrator
titleScan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator
bodyScan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator. This is a serious NGINX rewrite module vulnerability that may lead to worker crashes and, under specific conditions, potential code execution. Our detection helps organizations identify systems that show remote indicators associated with this vulnerability, enabling faster prioritization and remediation. CVE-2026-42945 is also part of a broader recent NGINX security update cycle, so administrators should review their complete NGINX patch status, not only this single CVE. #SecPoint #NGINX #CyberSecurity #VulnerabilityScanning #Penetrator ![secpoint-nginx-scanner.png](https://cdn.steemitimages.com/DQmbiKYsZ2Z3tZHzZU6ry6w4zgLc2s1rYdj79yFZtXWFCWo/secpoint-nginx-scanner.png)
json metadata{"tags":["secpoint","nginx","cybersecurity","vulnerabilityscanning","penetrator"],"image":["https://cdn.steemitimages.com/DQmbiKYsZ2Z3tZHzZU6ry6w4zgLc2s1rYdj79yFZtXWFCWo/secpoint-nginx-scanner.png"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #106184794/Trx 2974d336c2902c8431b7a64af69d1473f33aaba4
View Raw JSON Data
{
  "trx_id": "2974d336c2902c8431b7a64af69d1473f33aaba4",
  "block": 106184794,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-19T10:50:42",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "scan-for-possible-exposure-indicators-related-to-nginx-rift-cve-2026-42945-with-the-secpoint-penetrator",
      "title": "Scan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator",
      "body": "Scan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator.\n\nThis is a serious NGINX rewrite module vulnerability that may lead to worker crashes and, under specific conditions, potential code execution.\n\nOur detection helps organizations identify systems that show remote indicators associated with this vulnerability, enabling faster prioritization and remediation.\n\nCVE-2026-42945 is also part of a broader recent NGINX security update cycle, so administrators should review their complete NGINX patch status, not only this single CVE.\n\n#SecPoint #NGINX #CyberSecurity #VulnerabilityScanning #Penetrator\n![secpoint-nginx-scanner.png](https://cdn.steemitimages.com/DQmbiKYsZ2Z3tZHzZU6ry6w4zgLc2s1rYdj79yFZtXWFCWo/secpoint-nginx-scanner.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"nginx\",\"cybersecurity\",\"vulnerabilityscanning\",\"penetrator\"],\"image\":[\"https://cdn.steemitimages.com/DQmbiKYsZ2Z3tZHzZU6ry6w4zgLc2s1rYdj79yFZtXWFCWo/secpoint-nginx-scanner.png\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/13 07:54:42
parent author
parent permlinksecpoint
authorsecpoint
permlink5dstqp-from-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje
titleFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.
bodyhttps://www.youtube.com/watch?v=_qxw650UOrk From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje. In this short video, Fotis explains one of the strongest advantages of the SecPoint Penetrator licensing model. With SecPoint Penetrator, the license is based on how many IPs you scan at the same time, not on locking you to one fixed group of IP addresses. That makes a big difference. If you have a 2 IP license, you can scan 2 IPs simultaneously. If you need to scan 256 IPs, the Penetrator automatically places them in the scan queue and processes 2 at a time until the full scan is completed. If you have a 16 IP license, the same scan finishes much faster because more IPs are scanned in parallel. The important part is flexibility. You are not forced to stay with the same IPs forever. You can change targets, scan different customers, test different networks, and continue working within your licensed capacity. For partners, MSPs, consultants, and organizations, this is a very powerful model. It gives you unlimited scanning flexibility while keeping licensing simple, clear, and easy to understand. No complicated restrictions. No unnecessary limits. Just professional vulnerability scanning that adapts to how you actually work. Thank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session. #SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje
json metadata{"tags":["secpoint","cybersecurity","dataally","vulnerabilityscanning","skopje"],"image":["https://img.youtube.com/vi/_qxw650UOrk/0.jpg"],"links":["https://www.youtube.com/watch?v=_qxw650UOrk"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #106009318/Trx 45c54fb2732ea68343ea0e9669d33c91a0f19b23
View Raw JSON Data
{
  "trx_id": "45c54fb2732ea68343ea0e9669d33c91a0f19b23",
  "block": 106009318,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-13T07:54:42",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "5dstqp-from-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje",
      "title": "From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.",
      "body": "https://www.youtube.com/watch?v=_qxw650UOrk\n\nFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.\n\nIn this short video, Fotis explains one of the strongest advantages of the SecPoint Penetrator licensing model.\n\nWith SecPoint Penetrator, the license is based on how many IPs you scan at the same time, not on locking you to one fixed group of IP addresses.\n\nThat makes a big difference.\n\nIf you have a 2 IP license, you can scan 2 IPs simultaneously. If you need to scan 256 IPs, the Penetrator automatically places them in the scan queue and processes 2 at a time until the full scan is completed.\n\nIf you have a 16 IP license, the same scan finishes much faster because more IPs are scanned in parallel.\n\nThe important part is flexibility.\n\nYou are not forced to stay with the same IPs forever. You can change targets, scan different customers, test different networks, and continue working within your licensed capacity.\n\nFor partners, MSPs, consultants, and organizations, this is a very powerful model. \n\nIt gives you unlimited scanning flexibility while keeping licensing simple, clear, and easy to understand.\n\nNo complicated restrictions. No unnecessary limits. Just professional vulnerability scanning that adapts to how you actually work.\n\nThank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session.\n\n#SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"dataally\",\"vulnerabilityscanning\",\"skopje\"],\"image\":[\"https://img.youtube.com/vi/_qxw650UOrk/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=_qxw650UOrk\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/11 17:03:39
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-tm-v69-introduces-automatic-support-service-deactivation-for-improved-security
titleSecPoint® Protector™ V69 introduces automatic support service deactivation for improved security
bodyhttps://www.youtube.com/watch?v=xqqfZd75tMs SecPoint® Protector™ V69 introduces automatic support service deactivation for improved security. This function helps ensure that the support service does not remain active longer than needed after a remote support session. By automatically disabling the support service, administrators can reduce unnecessary exposure and keep the firewall environment more tightly controlled. This gives organizations a safer and more practical way to manage temporary support access, while maintaining strong operational security inside the SecPoint® Protector™ UTM firewall. With SecPoint® Protector™ V69, remote support becomes easier to manage, more controlled, and more secure. #SecPoint #CyberSecurity #Protector #Firewall #RemoteSupport
json metadata{"tags":["secpoint","cybersecurity","firewall","protector","remotesupport"],"image":["https://img.youtube.com/vi/xqqfZd75tMs/0.jpg"],"links":["https://www.youtube.com/watch?v=xqqfZd75tMs"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105962812/Trx 0983eec6b553d2b9b00e12bd282b1e032e3c1372
View Raw JSON Data
{
  "trx_id": "0983eec6b553d2b9b00e12bd282b1e032e3c1372",
  "block": 105962812,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-11T17:03:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-tm-v69-introduces-automatic-support-service-deactivation-for-improved-security",
      "title": "SecPoint® Protector™ V69 introduces automatic support service deactivation for improved security",
      "body": "https://www.youtube.com/watch?v=xqqfZd75tMs\nSecPoint® Protector™ V69 introduces automatic support service deactivation for improved security.\n\nThis function helps ensure that the support service does not remain active longer than needed after a remote support session.\n\nBy automatically disabling the support service, administrators can reduce unnecessary exposure and keep the firewall environment more tightly controlled.\n\nThis gives organizations a safer and more practical way to manage temporary support access, while maintaining strong operational security inside the SecPoint® Protector™ UTM firewall.\n\nWith SecPoint® Protector™ V69, remote support becomes easier to manage, more controlled, and more secure.\n\n#SecPoint #CyberSecurity #Protector #Firewall #RemoteSupport",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"firewall\",\"protector\",\"remotesupport\"],\"image\":[\"https://img.youtube.com/vi/xqqfZd75tMs/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=xqqfZd75tMs\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/11 09:40:30
parent author
parent permlinksecpoint
authorsecpoint
permlinkgreat-to-take-part-in-the-danish-norwegian-defence-industry-seminar-in-copenhagen
titleGreat to take part in the Danish Norwegian Defence Industry Seminar in Copenhagen
bodyGreat to take part in the Danish Norwegian Defence Industry Seminar in Copenhagen. We at SecPoint appreciated the opportunity to meet Norwegian and Danish defence industry stakeholders, exchange perspectives and explore new cooperation opportunities across the Nordic defence and security sector. The seminar gave strong insight into acquisition plans, bilateral industry cooperation, Ukraine defence industry cooperation, resilient supply chains and future collaboration between Denmark and Norway. It was especially valuable to hear perspectives from Lt. Gen. Kim Jesper Jørgensen, Colonel Rune Nesland Steinor, Peter Michael Nielsen and Dag Otto Winnæss, together with the wider Danish and Norwegian defence community. Thank you to DI Forsvar og sikkerhed, FSi, Joachim Finkielman and Maria Broman Ploug Rønning for a well organized event and for facilitating valuable B2B meetings and networking. We look forward to continuing the dialogue and strengthening Nordic cooperation in defence, resilience and cybersecurity. #SecPoint #defence #cybersecurity #nordiccooperation #DALO ![SecPoint-Danish-Norwegian Defence Industry Seminar-1.jpeg](https://cdn.steemitimages.com/DQmdPtT89VnhdVftiMME8Ff5PGgkqUennCLEujmXQZnt5J4/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-1.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-2.jpeg](https://cdn.steemitimages.com/DQmV8WMbHXZupkR33rQ1A3SmusE8vnJzvJNUD5Gur3gGvHZ/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-2.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-3.jpeg](https://cdn.steemitimages.com/DQmaJUKgAkVrcZwyC1URezpJbcK8GXaUznXCNxpnT4WWczY/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-3.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-4.jpeg](https://cdn.steemitimages.com/DQmavubeoVcY5Dj2StwfeAc8oNAKGACDLkCWi6nWKuwgne6/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-4.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-5.jpeg](https://cdn.steemitimages.com/DQmPGa7uZ7in2rapArLC8byQqDN4xhF6k2eazmv696AW3d3/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-5.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-6.jpeg](https://cdn.steemitimages.com/DQmSsUF8JYVuiKR9D4SK5CA6vRQZMCEDvDcweC6Hwgz35ew/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-6.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-7.jpeg](https://cdn.steemitimages.com/DQmfEsrjVxcrEAGBkDR8f4YJkGfZTN2fzjU2FDoxFF5er2v/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-7.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-8.jpeg](https://cdn.steemitimages.com/DQmRKv29bkZURiwTYFPV4CMqqtoeM3PsLBJdrEFmQSaeYYE/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-8.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-9.jpeg](https://cdn.steemitimages.com/DQma1LGptuiBqwuCKoKNsLGhGksrNFNDVoa9MjN34jN1iMt/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-9.jpeg) ![SecPoint-Danish-Norwegian Defence Industry Seminar-10.jpeg](https://cdn.steemitimages.com/DQmRgCy2dTtzSvQPszuaPk9Rgs4Cp8G7n3M7wChuHs2s8Vv/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-10.jpeg)
json metadata{"tags":["secpoint","cybersecurity","defence","nordiccooperation","dalo"],"image":["https://cdn.steemitimages.com/DQmdPtT89VnhdVftiMME8Ff5PGgkqUennCLEujmXQZnt5J4/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-1.jpeg","https://cdn.steemitimages.com/DQmV8WMbHXZupkR33rQ1A3SmusE8vnJzvJNUD5Gur3gGvHZ/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-2.jpeg","https://cdn.steemitimages.com/DQmaJUKgAkVrcZwyC1URezpJbcK8GXaUznXCNxpnT4WWczY/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-3.jpeg","https://cdn.steemitimages.com/DQmavubeoVcY5Dj2StwfeAc8oNAKGACDLkCWi6nWKuwgne6/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-4.jpeg","https://cdn.steemitimages.com/DQmPGa7uZ7in2rapArLC8byQqDN4xhF6k2eazmv696AW3d3/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-5.jpeg","https://cdn.steemitimages.com/DQmSsUF8JYVuiKR9D4SK5CA6vRQZMCEDvDcweC6Hwgz35ew/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-6.jpeg","https://cdn.steemitimages.com/DQmfEsrjVxcrEAGBkDR8f4YJkGfZTN2fzjU2FDoxFF5er2v/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-7.jpeg","https://cdn.steemitimages.com/DQmRKv29bkZURiwTYFPV4CMqqtoeM3PsLBJdrEFmQSaeYYE/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-8.jpeg","https://cdn.steemitimages.com/DQma1LGptuiBqwuCKoKNsLGhGksrNFNDVoa9MjN34jN1iMt/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-9.jpeg","https://cdn.steemitimages.com/DQmRgCy2dTtzSvQPszuaPk9Rgs4Cp8G7n3M7wChuHs2s8Vv/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-10.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105953970/Trx b2a6954386796696d24a4260b4d43cd56493d6e3
View Raw JSON Data
{
  "trx_id": "b2a6954386796696d24a4260b4d43cd56493d6e3",
  "block": 105953970,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-11T09:40:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "great-to-take-part-in-the-danish-norwegian-defence-industry-seminar-in-copenhagen",
      "title": "Great to take part in the Danish Norwegian Defence Industry Seminar in Copenhagen",
      "body": "Great to take part in the Danish Norwegian Defence Industry Seminar in Copenhagen.\n\nWe at SecPoint appreciated the opportunity to meet Norwegian and Danish defence industry stakeholders, exchange perspectives and explore new cooperation opportunities across the Nordic defence and security sector.\n\nThe seminar gave strong insight into acquisition plans, bilateral industry cooperation, Ukraine defence industry cooperation, resilient supply chains and future collaboration between Denmark and Norway.\n\nIt was especially valuable to hear perspectives from Lt. Gen. Kim Jesper Jørgensen, Colonel Rune Nesland Steinor, Peter Michael Nielsen and Dag Otto Winnæss, together with the wider Danish and Norwegian defence community.\n\nThank you to DI Forsvar og sikkerhed, FSi, Joachim Finkielman and Maria Broman Ploug Rønning for a well organized event and for facilitating valuable B2B meetings and networking.\n\nWe look forward to continuing the dialogue and strengthening Nordic cooperation in defence, resilience and cybersecurity.\n\n#SecPoint #defence #cybersecurity #nordiccooperation #DALO\n![SecPoint-Danish-Norwegian Defence Industry Seminar-1.jpeg](https://cdn.steemitimages.com/DQmdPtT89VnhdVftiMME8Ff5PGgkqUennCLEujmXQZnt5J4/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-1.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-2.jpeg](https://cdn.steemitimages.com/DQmV8WMbHXZupkR33rQ1A3SmusE8vnJzvJNUD5Gur3gGvHZ/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-2.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-3.jpeg](https://cdn.steemitimages.com/DQmaJUKgAkVrcZwyC1URezpJbcK8GXaUznXCNxpnT4WWczY/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-3.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-4.jpeg](https://cdn.steemitimages.com/DQmavubeoVcY5Dj2StwfeAc8oNAKGACDLkCWi6nWKuwgne6/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-4.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-5.jpeg](https://cdn.steemitimages.com/DQmPGa7uZ7in2rapArLC8byQqDN4xhF6k2eazmv696AW3d3/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-5.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-6.jpeg](https://cdn.steemitimages.com/DQmSsUF8JYVuiKR9D4SK5CA6vRQZMCEDvDcweC6Hwgz35ew/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-6.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-7.jpeg](https://cdn.steemitimages.com/DQmfEsrjVxcrEAGBkDR8f4YJkGfZTN2fzjU2FDoxFF5er2v/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-7.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-8.jpeg](https://cdn.steemitimages.com/DQmRKv29bkZURiwTYFPV4CMqqtoeM3PsLBJdrEFmQSaeYYE/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-8.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-9.jpeg](https://cdn.steemitimages.com/DQma1LGptuiBqwuCKoKNsLGhGksrNFNDVoa9MjN34jN1iMt/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-9.jpeg)\n\n![SecPoint-Danish-Norwegian Defence Industry Seminar-10.jpeg](https://cdn.steemitimages.com/DQmRgCy2dTtzSvQPszuaPk9Rgs4Cp8G7n3M7wChuHs2s8Vv/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-10.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"defence\",\"nordiccooperation\",\"dalo\"],\"image\":[\"https://cdn.steemitimages.com/DQmdPtT89VnhdVftiMME8Ff5PGgkqUennCLEujmXQZnt5J4/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-1.jpeg\",\"https://cdn.steemitimages.com/DQmV8WMbHXZupkR33rQ1A3SmusE8vnJzvJNUD5Gur3gGvHZ/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-2.jpeg\",\"https://cdn.steemitimages.com/DQmaJUKgAkVrcZwyC1URezpJbcK8GXaUznXCNxpnT4WWczY/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-3.jpeg\",\"https://cdn.steemitimages.com/DQmavubeoVcY5Dj2StwfeAc8oNAKGACDLkCWi6nWKuwgne6/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-4.jpeg\",\"https://cdn.steemitimages.com/DQmPGa7uZ7in2rapArLC8byQqDN4xhF6k2eazmv696AW3d3/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-5.jpeg\",\"https://cdn.steemitimages.com/DQmSsUF8JYVuiKR9D4SK5CA6vRQZMCEDvDcweC6Hwgz35ew/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-6.jpeg\",\"https://cdn.steemitimages.com/DQmfEsrjVxcrEAGBkDR8f4YJkGfZTN2fzjU2FDoxFF5er2v/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-7.jpeg\",\"https://cdn.steemitimages.com/DQmRKv29bkZURiwTYFPV4CMqqtoeM3PsLBJdrEFmQSaeYYE/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-8.jpeg\",\"https://cdn.steemitimages.com/DQma1LGptuiBqwuCKoKNsLGhGksrNFNDVoa9MjN34jN1iMt/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-9.jpeg\",\"https://cdn.steemitimages.com/DQmRgCy2dTtzSvQPszuaPk9Rgs4Cp8G7n3M7wChuHs2s8Vv/SecPoint-Danish-Norwegian%20Defence%20Industry%20Seminar-10.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/08 10:48:27
parent author
parent permlinksecpoint
authorsecpoint
permlinkit-was-a-pleasure-to-meet-many-relevant-customers-partners-and-industry-colleagues-and-to-discuss-how-we-can-strengthen-european
titleIt was a pleasure to meet many relevant customers, partners and industry colleagues, and to discuss how we can strengthen European cyber
bodyIt was a pleasure to meet many relevant customers, partners and industry colleagues, and to discuss how we can strengthen European cyber defence, resilience and readiness. In a changing geopolitical landscape, Europe must become stronger, faster and more independent in critical security technologies. A special thank you to Dustin Paul Wilden and the entire CenSec team for organizing the event, and to Marie Birkedal Kluth from the Danish Ministry of Defence and Carsten Bach from Liberal Alliance for their valuable perspectives during the event. #SecPoint #CenSec #CyberSecurity #DefenceIndustry #EuropeanSecurity![SecPoint-Fredericia-CenSec2026v2-1.jpeg](https://cdn.steemitimages.com/DQmQ5kN5emVBXZfX76mJ8tBVz5D4HagX6kncwWAnsYcAP9y/SecPoint-Fredericia-CenSec2026v2-1.jpeg) ![SecPoint-Fredericia-CenSec2026v2-2.jpeg](https://cdn.steemitimages.com/DQmQmijvFtHz3E7rdqWa8xAiXdrufctzwJU2eHtV1D9CZnG/SecPoint-Fredericia-CenSec2026v2-2.jpeg) ![SecPoint-Fredericia-CenSec2026v2-3.jpeg](https://cdn.steemitimages.com/DQmb4ssUksByAsv5B9mVC62EH8Z7sncgvNQCxmCoqqSfML5/SecPoint-Fredericia-CenSec2026v2-3.jpeg) ![SecPoint-Fredericia-CenSec2026v2-4.jpeg](https://cdn.steemitimages.com/DQmYmi9WhWexVqm3JYq7fmPvv7mpqGN5VpFRAiWvfN7bogX/SecPoint-Fredericia-CenSec2026v2-4.jpeg)
json metadata{"tags":["secpoint","cybersecurity","censec","defenceindustry","europeansecurity"],"image":["https://cdn.steemitimages.com/DQmQ5kN5emVBXZfX76mJ8tBVz5D4HagX6kncwWAnsYcAP9y/SecPoint-Fredericia-CenSec2026v2-1.jpeg","https://cdn.steemitimages.com/DQmQmijvFtHz3E7rdqWa8xAiXdrufctzwJU2eHtV1D9CZnG/SecPoint-Fredericia-CenSec2026v2-2.jpeg","https://cdn.steemitimages.com/DQmb4ssUksByAsv5B9mVC62EH8Z7sncgvNQCxmCoqqSfML5/SecPoint-Fredericia-CenSec2026v2-3.jpeg","https://cdn.steemitimages.com/DQmYmi9WhWexVqm3JYq7fmPvv7mpqGN5VpFRAiWvfN7bogX/SecPoint-Fredericia-CenSec2026v2-4.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105869241/Trx 4f9c1e6f35270b086ae1dc20d7347fbfd8f1190b
View Raw JSON Data
{
  "trx_id": "4f9c1e6f35270b086ae1dc20d7347fbfd8f1190b",
  "block": 105869241,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-08T10:48:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "it-was-a-pleasure-to-meet-many-relevant-customers-partners-and-industry-colleagues-and-to-discuss-how-we-can-strengthen-european",
      "title": "It was a pleasure to meet many relevant customers, partners and industry colleagues, and to discuss how we can strengthen European cyber",
      "body": "It was a pleasure to meet many relevant customers, partners and industry colleagues, and to discuss how we can strengthen European cyber defence, resilience and readiness.\n\nIn a changing geopolitical landscape, Europe must become stronger, faster and more independent in critical security technologies.\n\nA special thank you to Dustin Paul Wilden and the entire CenSec team for organizing the event, and to Marie Birkedal Kluth from the Danish Ministry of Defence and Carsten Bach from Liberal Alliance for their valuable perspectives during the event.\n\n#SecPoint #CenSec #CyberSecurity #DefenceIndustry #EuropeanSecurity![SecPoint-Fredericia-CenSec2026v2-1.jpeg](https://cdn.steemitimages.com/DQmQ5kN5emVBXZfX76mJ8tBVz5D4HagX6kncwWAnsYcAP9y/SecPoint-Fredericia-CenSec2026v2-1.jpeg)\n\n![SecPoint-Fredericia-CenSec2026v2-2.jpeg](https://cdn.steemitimages.com/DQmQmijvFtHz3E7rdqWa8xAiXdrufctzwJU2eHtV1D9CZnG/SecPoint-Fredericia-CenSec2026v2-2.jpeg)\n\n![SecPoint-Fredericia-CenSec2026v2-3.jpeg](https://cdn.steemitimages.com/DQmb4ssUksByAsv5B9mVC62EH8Z7sncgvNQCxmCoqqSfML5/SecPoint-Fredericia-CenSec2026v2-3.jpeg)\n\n![SecPoint-Fredericia-CenSec2026v2-4.jpeg](https://cdn.steemitimages.com/DQmYmi9WhWexVqm3JYq7fmPvv7mpqGN5VpFRAiWvfN7bogX/SecPoint-Fredericia-CenSec2026v2-4.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"censec\",\"defenceindustry\",\"europeansecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmQ5kN5emVBXZfX76mJ8tBVz5D4HagX6kncwWAnsYcAP9y/SecPoint-Fredericia-CenSec2026v2-1.jpeg\",\"https://cdn.steemitimages.com/DQmQmijvFtHz3E7rdqWa8xAiXdrufctzwJU2eHtV1D9CZnG/SecPoint-Fredericia-CenSec2026v2-2.jpeg\",\"https://cdn.steemitimages.com/DQmb4ssUksByAsv5B9mVC62EH8Z7sncgvNQCxmCoqqSfML5/SecPoint-Fredericia-CenSec2026v2-3.jpeg\",\"https://cdn.steemitimages.com/DQmYmi9WhWexVqm3JYq7fmPvv7mpqGN5VpFRAiWvfN7bogX/SecPoint-Fredericia-CenSec2026v2-4.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/08 10:17:00
voterjamalgayoni
authorsecpoint
permlinkstrong-day-at-censec-sommertraef-2026-in-fredericia-it-was-a-pleasure-meeting-ole-egberg-mikkelsen
weight10000 (100.00%)
Transaction InfoBlock #105868612/Trx 5868ce123abfeebb661a8319cc3e75b6e1ae0074
View Raw JSON Data
{
  "trx_id": "5868ce123abfeebb661a8319cc3e75b6e1ae0074",
  "block": 105868612,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-08T10:17:00",
  "op": [
    "vote",
    {
      "voter": "jamalgayoni",
      "author": "secpoint",
      "permlink": "strong-day-at-censec-sommertraef-2026-in-fredericia-it-was-a-pleasure-meeting-ole-egberg-mikkelsen",
      "weight": 10000
    }
  ]
}
2026/05/08 10:08:00
parent author
parent permlinksecpoint
authorsecpoint
permlinkstrong-day-at-censec-sommertraef-2026-in-fredericia-it-was-a-pleasure-meeting-ole-egberg-mikkelsen
titleStrong day at CenSec Sommertræf 2026 in Fredericia. It was a pleasure meeting Ole Egberg Mikkelsen
bodyStrong day at CenSec Sommertræf 2026 in Fredericia. It was a pleasure meeting Ole Egberg Mikkelsen, Ambassador and Special Representative for private partnerships for Ukraine’s defense industry. At SecPoint, we continue to support stronger European cyber defence capabilities and trusted cooperation with partners working to protect Ukraine and critical infrastructure. #SecPoint #Ukraine #CyberSecurity #DefenceIndustry #CenSec ![SecPoint-Ambassador-May-2026.jpeg](https://cdn.steemitimages.com/DQmVBC6rD6MoQz71D5MAawfCBJ9PcqT4Nvbc7DVb16SuDQP/SecPoint-Ambassador-May-2026.jpeg)
json metadata{"tags":["secpoint","cybersecurity","ukraine","defenceindustry","censec"],"image":["https://cdn.steemitimages.com/DQmVBC6rD6MoQz71D5MAawfCBJ9PcqT4Nvbc7DVb16SuDQP/SecPoint-Ambassador-May-2026.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105868432/Trx 10e9ae6bc12ed66745a42f8d13e17f8005c59617
View Raw JSON Data
{
  "trx_id": "10e9ae6bc12ed66745a42f8d13e17f8005c59617",
  "block": 105868432,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-08T10:08:00",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "strong-day-at-censec-sommertraef-2026-in-fredericia-it-was-a-pleasure-meeting-ole-egberg-mikkelsen",
      "title": "Strong day at CenSec Sommertræf 2026 in Fredericia.  It was a pleasure meeting Ole Egberg Mikkelsen",
      "body": "Strong day at CenSec Sommertræf 2026 in Fredericia.\n\nIt was a pleasure meeting Ole Egberg Mikkelsen, Ambassador and Special Representative for private partnerships for Ukraine’s defense industry.\n\nAt SecPoint, we continue to support stronger European cyber defence capabilities and trusted cooperation with partners working to protect Ukraine and critical infrastructure.\n\n#SecPoint #Ukraine #CyberSecurity #DefenceIndustry #CenSec\n![SecPoint-Ambassador-May-2026.jpeg](https://cdn.steemitimages.com/DQmVBC6rD6MoQz71D5MAawfCBJ9PcqT4Nvbc7DVb16SuDQP/SecPoint-Ambassador-May-2026.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"ukraine\",\"defenceindustry\",\"censec\"],\"image\":[\"https://cdn.steemitimages.com/DQmVBC6rD6MoQz71D5MAawfCBJ9PcqT4Nvbc7DVb16SuDQP/SecPoint-Ambassador-May-2026.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/08 08:46:36
parent author
parent permlinksecpoint
authorsecpoint
permlinkarrived-in-fredericia-for-the-censec-center-for-defence-space-and-security-sommertraef-2026-at-messe-c-fredericia
titleArrived in Fredericia for the CenSec - Center for Defence, Space & Security Sommertræf 2026 at MESSE C, Fredericia.
bodyArrived in Fredericia for the CenSec - Center for Defence, Space & Security Sommertræf 2026 at MESSE C, Fredericia. Looking forward to a strong day with Danish defence, security, and technology companies, focused on networking, cooperation, and new opportunities within cyber defence. SecPoint ® is here to present our European cybersecurity solutions: SecPoint® Penetrator™ for vulnerability scanning SecPoint® Protector™ for firewall and intrusion prevention Always good to meet Dustin Paul Wilden #SecPoint #CenSec #CyberSecurity #Defence #Fredericia ![SecPoint-Fredericia-CenSec2026-4.jpeg](https://cdn.steemitimages.com/DQmVVPgrrM3b1MDjXEbEpZJSi33ycW2vKKZvHJpF4Npm2ue/SecPoint-Fredericia-CenSec2026-4.jpeg) ![SecPoint-Fredericia-CenSec2026-3.jpeg](https://cdn.steemitimages.com/DQmY9b2o5NW6moHZBbqCp3cXBfuKR6EPbJYBCLjM5PigFGk/SecPoint-Fredericia-CenSec2026-3.jpeg) ![SecPoint-Fredericia-CenSec2026-2.jpeg](https://cdn.steemitimages.com/DQmPs4EVgpPXznuquZwz9Qk6ELmFZ24hjDYUhyNggfR4q3L/SecPoint-Fredericia-CenSec2026-2.jpeg) ![SecPoint-Fredericia-CenSec2026-1.jpeg](https://cdn.steemitimages.com/DQmcGbVh9oj7sW2eeZXf5yN5q7W9eXVPwqiWGrqjuRMw6rh/SecPoint-Fredericia-CenSec2026-1.jpeg)
json metadata{"tags":["secpoint","cybersecurity","censec","defence","fredericia"],"image":["https://cdn.steemitimages.com/DQmVVPgrrM3b1MDjXEbEpZJSi33ycW2vKKZvHJpF4Npm2ue/SecPoint-Fredericia-CenSec2026-4.jpeg","https://cdn.steemitimages.com/DQmY9b2o5NW6moHZBbqCp3cXBfuKR6EPbJYBCLjM5PigFGk/SecPoint-Fredericia-CenSec2026-3.jpeg","https://cdn.steemitimages.com/DQmPs4EVgpPXznuquZwz9Qk6ELmFZ24hjDYUhyNggfR4q3L/SecPoint-Fredericia-CenSec2026-2.jpeg","https://cdn.steemitimages.com/DQmcGbVh9oj7sW2eeZXf5yN5q7W9eXVPwqiWGrqjuRMw6rh/SecPoint-Fredericia-CenSec2026-1.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105866810/Trx 8f20f4afc13d4388f881c5dadb7dfb200a7adfc3
View Raw JSON Data
{
  "trx_id": "8f20f4afc13d4388f881c5dadb7dfb200a7adfc3",
  "block": 105866810,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-08T08:46:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "arrived-in-fredericia-for-the-censec-center-for-defence-space-and-security-sommertraef-2026-at-messe-c-fredericia",
      "title": "Arrived in Fredericia for the CenSec - Center for Defence, Space & Security Sommertræf 2026 at MESSE C, Fredericia.",
      "body": "Arrived in Fredericia for the CenSec - Center for Defence, Space & Security Sommertræf 2026 at MESSE C, Fredericia.\n\nLooking forward to a strong day with Danish defence, security, and technology companies, focused on networking, cooperation, and new opportunities within cyber defence.\n\nSecPoint ® is here to present our European cybersecurity solutions:\nSecPoint® Penetrator™ for vulnerability scanning\nSecPoint® Protector™ for firewall and intrusion prevention\n\nAlways good to meet Dustin Paul Wilden \n\n#SecPoint #CenSec #CyberSecurity #Defence #Fredericia\n![SecPoint-Fredericia-CenSec2026-4.jpeg](https://cdn.steemitimages.com/DQmVVPgrrM3b1MDjXEbEpZJSi33ycW2vKKZvHJpF4Npm2ue/SecPoint-Fredericia-CenSec2026-4.jpeg)\n\n![SecPoint-Fredericia-CenSec2026-3.jpeg](https://cdn.steemitimages.com/DQmY9b2o5NW6moHZBbqCp3cXBfuKR6EPbJYBCLjM5PigFGk/SecPoint-Fredericia-CenSec2026-3.jpeg)\n\n![SecPoint-Fredericia-CenSec2026-2.jpeg](https://cdn.steemitimages.com/DQmPs4EVgpPXznuquZwz9Qk6ELmFZ24hjDYUhyNggfR4q3L/SecPoint-Fredericia-CenSec2026-2.jpeg)\n\n![SecPoint-Fredericia-CenSec2026-1.jpeg](https://cdn.steemitimages.com/DQmcGbVh9oj7sW2eeZXf5yN5q7W9eXVPwqiWGrqjuRMw6rh/SecPoint-Fredericia-CenSec2026-1.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"censec\",\"defence\",\"fredericia\"],\"image\":[\"https://cdn.steemitimages.com/DQmVVPgrrM3b1MDjXEbEpZJSi33ycW2vKKZvHJpF4Npm2ue/SecPoint-Fredericia-CenSec2026-4.jpeg\",\"https://cdn.steemitimages.com/DQmY9b2o5NW6moHZBbqCp3cXBfuKR6EPbJYBCLjM5PigFGk/SecPoint-Fredericia-CenSec2026-3.jpeg\",\"https://cdn.steemitimages.com/DQmPs4EVgpPXznuquZwz9Qk6ELmFZ24hjDYUhyNggfR4q3L/SecPoint-Fredericia-CenSec2026-2.jpeg\",\"https://cdn.steemitimages.com/DQmcGbVh9oj7sW2eeZXf5yN5q7W9eXVPwqiWGrqjuRMw6rh/SecPoint-Fredericia-CenSec2026-1.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/05 15:02:57
parent author
parent permlinksecpoint
authorsecpoint
permlinkai-models-like-anthropic-s-claude-mythos-preview-show-how-fast-cybersecurity-is-changing
titleAI models like Anthropic’s Claude Mythos Preview show how fast cybersecurity is changing
bodyAI models like Anthropic’s Claude Mythos Preview show how fast cybersecurity is changing. The real shift is not panic. It is speed, scale, and automation. AI can help security teams find vulnerabilities faster, analyse complex systems more efficiently, and prioritise risks with greater accuracy. That means the next generation of cybersecurity will depend on stronger integration between: * AI-assisted vulnerability discovery * Continuous scanning * Faster remediation * Real-time intrusion prevention * Better visibility and reporting In our new SecPoint® article, we look at what Claude Mythos means for cybersecurity, the risks it creates, and how AI-driven development can improve the security tools organisations already depend on. https://www.secpoint.com/anthropic-mythos-what-it-means.html #SecPoint #CyberSecurity #AI #VulnerabilityScanning #IntrusionPrevention ![Anthropic-Mythos.png](https://cdn.steemitimages.com/DQmbkEhhV66zrkbpU27HyPqqZViwGk9RxQwL13Xwri911tw/Anthropic-Mythos.png)
json metadata{"tags":["secpoint","cybersecurity","ai","vulnerabilityscanning","intrusionprevention"],"image":["https://cdn.steemitimages.com/DQmbkEhhV66zrkbpU27HyPqqZViwGk9RxQwL13Xwri911tw/Anthropic-Mythos.png"],"links":["https://www.secpoint.com/anthropic-mythos-what-it-means.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105788153/Trx 8a2c0607c6a67822ed9b29bc18728c0d1a379e87
View Raw JSON Data
{
  "trx_id": "8a2c0607c6a67822ed9b29bc18728c0d1a379e87",
  "block": 105788153,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-05T15:02:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "ai-models-like-anthropic-s-claude-mythos-preview-show-how-fast-cybersecurity-is-changing",
      "title": "AI models like Anthropic’s Claude Mythos Preview show how fast cybersecurity is changing",
      "body": "AI models like Anthropic’s Claude Mythos Preview show how fast cybersecurity is changing.\n\nThe real shift is not panic.\nIt is speed, scale, and automation.\n\nAI can help security teams find vulnerabilities faster, analyse complex systems more efficiently, and prioritise risks with greater accuracy.\n\nThat means the next generation of cybersecurity will depend on stronger integration between:\n\n* AI-assisted vulnerability discovery\n* Continuous scanning\n* Faster remediation\n* Real-time intrusion prevention\n* Better visibility and reporting\n\nIn our new SecPoint® article, we look at what Claude Mythos means for cybersecurity, the risks it creates, and how AI-driven development can improve the security tools organisations already depend on.\n\nhttps://www.secpoint.com/anthropic-mythos-what-it-means.html\n\n#SecPoint #CyberSecurity #AI #VulnerabilityScanning #IntrusionPrevention\n![Anthropic-Mythos.png](https://cdn.steemitimages.com/DQmbkEhhV66zrkbpU27HyPqqZViwGk9RxQwL13Xwri911tw/Anthropic-Mythos.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"ai\",\"vulnerabilityscanning\",\"intrusionprevention\"],\"image\":[\"https://cdn.steemitimages.com/DQmbkEhhV66zrkbpU27HyPqqZViwGk9RxQwL13Xwri911tw/Anthropic-Mythos.png\"],\"links\":[\"https://www.secpoint.com/anthropic-mythos-what-it-means.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/05 12:22:15
parent author
parent permlinksecpoint
authorsecpoint
permlinkfrom-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje-in-this-short
titleFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje. In this short video, Fotis demonstrates how easy it is to change the reporting language
bodyhttps://www.youtube.com/watch?v=9Q5KA9mXUrg From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje. In this short video, Fotis demonstrates how easy it is to change the reporting language in the SecPoint® Penetrator™. This allows partners, MSPs, and organizations to generate professional vulnerability scanning reports in the language needed for their customers, management teams, and local markets. A simple but important feature that makes reporting clearer, more flexible, and easier to present. Thank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session. #SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje
json metadata{"tags":["secpoint","cybersecurity","dataally","vulnerabilityscanning","skopje"],"image":["https://img.youtube.com/vi/9Q5KA9mXUrg/0.jpg"],"links":["https://www.youtube.com/watch?v=9Q5KA9mXUrg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105784945/Trx a5ae9a198b0ef02652524804a0caa823e422c120
View Raw JSON Data
{
  "trx_id": "a5ae9a198b0ef02652524804a0caa823e422c120",
  "block": 105784945,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-05T12:22:15",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "from-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje-in-this-short",
      "title": "From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.  In this short video, Fotis demonstrates how easy it is to change the reporting language",
      "body": "https://www.youtube.com/watch?v=9Q5KA9mXUrg\nFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.\n\nIn this short video, Fotis demonstrates how easy it is to change the reporting language in the SecPoint® Penetrator™.\n\nThis allows partners, MSPs, and organizations to generate professional vulnerability scanning reports in the language needed for their customers, management teams, and local markets.\n\nA simple but important feature that makes reporting clearer, more flexible, and easier to present.\n\nThank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session.\n\n#SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"dataally\",\"vulnerabilityscanning\",\"skopje\"],\"image\":[\"https://img.youtube.com/vi/9Q5KA9mXUrg/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=9Q5KA9mXUrg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/05 10:56:57
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-tm-v69-introduces-automatic-geoip-database
titleSecPoint® Protector™ V69 introduces automatic GeoIP database
bodyhttps://www.youtube.com/watch?v=s92LDnN9mBc SecPoint® Protector™ V69 introduces automatic GeoIP database updates for the Live Intrusion Prevention Attack Map. This helps ensure that attack origins, countries, and IP location data stay accurate without manual updates or human intervention. Administrators can get a clearer real-time view of where attacks are coming from, with improved visibility directly inside the SecPoint® Protector™ firewall interface. With SecPoint® Protector™ V69, live cyber attack visibility becomes more accurate, automated, and easier to understand. #SecPoint #CyberSecurity #Protector #Firewall #IntrusionPrevention
json metadata{"tags":["secpoint","cybersecurity","protector","firewall","intrusionprevention"],"image":["https://img.youtube.com/vi/s92LDnN9mBc/0.jpg"],"links":["https://www.youtube.com/watch?v=s92LDnN9mBc"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105783242/Trx ae88af6ed990a2772ba8521e88e9c565383e609e
View Raw JSON Data
{
  "trx_id": "ae88af6ed990a2772ba8521e88e9c565383e609e",
  "block": 105783242,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-05T10:56:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-tm-v69-introduces-automatic-geoip-database",
      "title": "SecPoint® Protector™ V69 introduces automatic GeoIP database",
      "body": "https://www.youtube.com/watch?v=s92LDnN9mBc\nSecPoint® Protector™ V69 introduces automatic GeoIP database updates for the Live Intrusion Prevention Attack Map.\n\nThis helps ensure that attack origins, countries, and IP location data stay accurate without manual updates or human intervention.\n\nAdministrators can get a clearer real-time view of where attacks are coming from, with improved visibility directly inside the SecPoint® Protector™ firewall interface.\n\nWith SecPoint® Protector™ V69, live cyber attack visibility becomes more accurate, automated, and easier to understand.\n\n#SecPoint #CyberSecurity #Protector #Firewall #IntrusionPrevention",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"protector\",\"firewall\",\"intrusionprevention\"],\"image\":[\"https://img.youtube.com/vi/s92LDnN9mBc/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=s92LDnN9mBc\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/04 06:34:36
parent author
parent permlinksecpoint
authorsecpoint
permlinkit-was-a-pleasure-visiting-cybercampus-sverige-and-the-royal-hacking-lab-in-stockholm
titleIt was a pleasure visiting Cybercampus Sverige and the Royal Hacking Lab in Stockholm
bodyIt was a pleasure visiting Cybercampus Sverige and the Royal Hacking Lab in Stockholm. A special thank you to Dr. Emre Süren, Head of Royal Hacking Lab at Cybercampus Sverige and Researcher at KTH Royal Institute of Technology, for showing us the impressive work being done there. Cybercampus Sverige is a national initiative in Sweden, hosted by KTH Royal Institute of Technology, one of Europe’s leading technical universities, bringing together academia, industry, and government to strengthen cybersecurity research and innovation. The Royal Hacking Lab operates as a hands-on research environment focused on offensive security, AI-driven analysis, and real-world vulnerability discovery. It was inspiring to see how research, practical hacking, AI, and real-world cybersecurity challenges come together in one place. The Royal Hacking Lab has publicly listed more than 56 vulnerability discoveries, which shows the strong impact of applied security research. Thank you for the visit and the great conversation. #SecPoint #CyberSecurity #CybercampusSverige #RoyalHackingLab #Stockholm ![SecPoint-CyberCampus1.jpg](https://cdn.steemitimages.com/DQmdusECnVHXTAvowtYC27kcePBkAWqPNhjMcHfufWVwaR2/SecPoint-CyberCampus1.jpg) ![SecPoint-CyberCampus2.jpg](https://cdn.steemitimages.com/DQmcas1MZTjWrk9ma23cKw3FsJbe2FYaKr3dr7SgAxybEPp/SecPoint-CyberCampus2.jpg) ![SecPoint-CyberCampus3.jpg](https://cdn.steemitimages.com/DQmd9y3DLCAWKnGBkMDjMwxo6E8wzYKDm72PVuKoqGmJgLA/SecPoint-CyberCampus3.jpg) ![SecPoint-CyberCampus4.jpg](https://cdn.steemitimages.com/DQmRbWYdgyEADfRL2odssqHRdXh7uK7xyzc9wkkThLqg3RP/SecPoint-CyberCampus4.jpg)
json metadata{"tags":["secpoint","cybersecurity","cybercampussverige","royalhackinglab","stockholm"],"image":["https://cdn.steemitimages.com/DQmdusECnVHXTAvowtYC27kcePBkAWqPNhjMcHfufWVwaR2/SecPoint-CyberCampus1.jpg","https://cdn.steemitimages.com/DQmcas1MZTjWrk9ma23cKw3FsJbe2FYaKr3dr7SgAxybEPp/SecPoint-CyberCampus2.jpg","https://cdn.steemitimages.com/DQmd9y3DLCAWKnGBkMDjMwxo6E8wzYKDm72PVuKoqGmJgLA/SecPoint-CyberCampus3.jpg","https://cdn.steemitimages.com/DQmRbWYdgyEADfRL2odssqHRdXh7uK7xyzc9wkkThLqg3RP/SecPoint-CyberCampus4.jpg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105749276/Trx 441e33af2b9efcf24272adc67f8aacea2fa9582f
View Raw JSON Data
{
  "trx_id": "441e33af2b9efcf24272adc67f8aacea2fa9582f",
  "block": 105749276,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-04T06:34:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "it-was-a-pleasure-visiting-cybercampus-sverige-and-the-royal-hacking-lab-in-stockholm",
      "title": "It was a pleasure visiting Cybercampus Sverige and the Royal Hacking Lab in Stockholm",
      "body": "It was a pleasure visiting Cybercampus Sverige and the Royal Hacking Lab in Stockholm.\n\nA special thank you to Dr. Emre Süren, Head of Royal Hacking Lab at Cybercampus Sverige and Researcher at KTH Royal Institute of Technology, for showing us the impressive work being done there.\n\nCybercampus Sverige is a national initiative in Sweden, hosted by KTH Royal Institute of Technology, one of Europe’s leading technical universities, bringing together academia, industry, and government to strengthen cybersecurity research and innovation. The Royal Hacking Lab operates as a hands-on research environment focused on offensive security, AI-driven analysis, and real-world vulnerability discovery.\n\nIt was inspiring to see how research, practical hacking, AI, and real-world cybersecurity challenges come together in one place.\n\nThe Royal Hacking Lab has publicly listed more than 56 vulnerability discoveries, which shows the strong impact of applied security research.\n\nThank you for the visit and the great conversation.\n\n#SecPoint #CyberSecurity #CybercampusSverige #RoyalHackingLab #Stockholm\n![SecPoint-CyberCampus1.jpg](https://cdn.steemitimages.com/DQmdusECnVHXTAvowtYC27kcePBkAWqPNhjMcHfufWVwaR2/SecPoint-CyberCampus1.jpg)\n\n![SecPoint-CyberCampus2.jpg](https://cdn.steemitimages.com/DQmcas1MZTjWrk9ma23cKw3FsJbe2FYaKr3dr7SgAxybEPp/SecPoint-CyberCampus2.jpg)\n\n![SecPoint-CyberCampus3.jpg](https://cdn.steemitimages.com/DQmd9y3DLCAWKnGBkMDjMwxo6E8wzYKDm72PVuKoqGmJgLA/SecPoint-CyberCampus3.jpg)\n\n![SecPoint-CyberCampus4.jpg](https://cdn.steemitimages.com/DQmRbWYdgyEADfRL2odssqHRdXh7uK7xyzc9wkkThLqg3RP/SecPoint-CyberCampus4.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybercampussverige\",\"royalhackinglab\",\"stockholm\"],\"image\":[\"https://cdn.steemitimages.com/DQmdusECnVHXTAvowtYC27kcePBkAWqPNhjMcHfufWVwaR2/SecPoint-CyberCampus1.jpg\",\"https://cdn.steemitimages.com/DQmcas1MZTjWrk9ma23cKw3FsJbe2FYaKr3dr7SgAxybEPp/SecPoint-CyberCampus2.jpg\",\"https://cdn.steemitimages.com/DQmd9y3DLCAWKnGBkMDjMwxo6E8wzYKDm72PVuKoqGmJgLA/SecPoint-CyberCampus3.jpg\",\"https://cdn.steemitimages.com/DQmRbWYdgyEADfRL2odssqHRdXh7uK7xyzc9wkkThLqg3RP/SecPoint-CyberCampus4.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/05/01 13:53:36
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-and-penetrator-may-2026-software-releases-available
titleSecPoint® Protector & Penetrator May 2026 Software Releases Available
bodySecPoint® Protector & Penetrator May 2026 Software Releases Available The May 2026 software releases for SecPoint Protector and SecPoint Penetrator are now available for download in the SecPoint VIP Lounge. These releases continue our focus on stronger security, better usability, improved reporting, and a more stable daily operating experience for customers and partners. Highlights of the May 2026 releases: • SecPoint Protector V69 with key improvements including the new recent attack track on the map, automatic periodic GeoIP updates, improved firmware and database update reliability, and a new parameter to automatically switch off remote support after a set period • SecPoint Penetrator, based on firmware v67, with continued benefits from smarter Lethalattack improvements, XLS report export, and the CRA and CWE compliance profiles • Further platform enhancements to support more reliable and efficient day to day security operations Available image formats: • Virtual Images, including Proxmox • Raw Linux Images Access the latest releases in the SecPoint VIP Lounge: https://vip.secpoint.com/ #SecPoint #Protector #Penetrator #CyberSecurity #NetworkSecurity ![secpoint-may-software1.png](https://cdn.steemitimages.com/DQmXCj49KU4iRHcrv8dDc85xNfv8cHS4ZudF1rexdmUKzj2/secpoint-may-software1.png)
json metadata{"tags":["secpoint","cybersecurity","protector","penetrator","networksecurity"],"image":["https://cdn.steemitimages.com/DQmXCj49KU4iRHcrv8dDc85xNfv8cHS4ZudF1rexdmUKzj2/secpoint-may-software1.png"],"links":["https://vip.secpoint.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105671827/Trx 0c5e0ce26cc1fe9b9572d15365482337a32b9570
View Raw JSON Data
{
  "trx_id": "0c5e0ce26cc1fe9b9572d15365482337a32b9570",
  "block": 105671827,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-01T13:53:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-and-penetrator-may-2026-software-releases-available",
      "title": "SecPoint® Protector & Penetrator May 2026 Software Releases Available",
      "body": "SecPoint® Protector & Penetrator May 2026 Software Releases Available\n\nThe May 2026 software releases for SecPoint Protector and SecPoint Penetrator are now available for download in the SecPoint VIP Lounge.\n\nThese releases continue our focus on stronger security, better usability, improved reporting, and a more stable daily operating experience for customers and partners.\n\nHighlights of the May 2026 releases:\n\n• SecPoint Protector V69 with key improvements including the new recent attack track on the map, automatic periodic GeoIP updates, improved firmware and database update reliability, and a new parameter to automatically switch off remote support after a set period\n• SecPoint Penetrator, based on firmware v67, with continued benefits from smarter Lethalattack improvements, XLS report export, and the CRA and CWE compliance profiles\n• Further platform enhancements to support more reliable and efficient day to day security operations\n\nAvailable image formats:\n• Virtual Images, including Proxmox\n• Raw Linux Images\n\nAccess the latest releases in the SecPoint VIP Lounge:\nhttps://vip.secpoint.com/\n\n#SecPoint #Protector #Penetrator #CyberSecurity #NetworkSecurity\n![secpoint-may-software1.png](https://cdn.steemitimages.com/DQmXCj49KU4iRHcrv8dDc85xNfv8cHS4ZudF1rexdmUKzj2/secpoint-may-software1.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"protector\",\"penetrator\",\"networksecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmXCj49KU4iRHcrv8dDc85xNfv8cHS4ZudF1rexdmUKzj2/secpoint-may-software1.png\"],\"links\":[\"https://vip.secpoint.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/29 11:24:33
parent author
parent permlinkcybersecurity
authorsecpoint
permlinkfrom-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje
titleFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje
bodyhttps://youtu.be/PGlMxQXJQOg From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje. In this short video, Fotis demonstrates how the SecPoint Penetrator can be branded with a partner or customer identity, including the login page logo, interface branding, and report branding. This is especially valuable for partners, MSPs, and organizations that want professional vulnerability scanning reports presented under their own brand. Thank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session. #SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje
json metadata{"tags":["cybersecurity","secpoint","dataally","vulnerabilityscanning","skopje"],"image":["https://img.youtube.com/vi/PGlMxQXJQOg/0.jpg"],"links":["https://youtu.be/PGlMxQXJQOg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105611408/Trx fbf932787527bbf8caebf686d68937ccebf2aa5b
View Raw JSON Data
{
  "trx_id": "fbf932787527bbf8caebf686d68937ccebf2aa5b",
  "block": 105611408,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-29T11:24:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "secpoint",
      "permlink": "from-the-technical-session-with-fotis-chalios-from-data-ally-at-the-future-of-cyberdefense-conference-in-skopje",
      "title": "From the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje",
      "body": "https://youtu.be/PGlMxQXJQOg\n\nFrom the technical session with Fotis Chalios from Data Ally at The Future of Cyberdefense Conference in Skopje.\n\nIn this short video, Fotis demonstrates how the SecPoint Penetrator can be branded with a partner or customer identity, including the login page logo, interface branding, and report branding.\n\nThis is especially valuable for partners, MSPs, and organizations that want professional vulnerability scanning reports presented under their own brand.\n\nThank you to Fotis Chalios and the Data Ally team for the strong technical cooperation and a very professional session.\n\n#SecPoint #DataAlly #CyberSecurity #VulnerabilityScanning #Skopje",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"secpoint\",\"dataally\",\"vulnerabilityscanning\",\"skopje\"],\"image\":[\"https://img.youtube.com/vi/PGlMxQXJQOg/0.jpg\"],\"links\":[\"https://youtu.be/PGlMxQXJQOg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/28 17:14:33
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-tm-v69-introduces-an-improved-live-intrusion-prevention-attack-map-giving-administrators-a-clearer-real
titleSecPoint® Protector™ V69 introduces an improved Live Intrusion Prevention Attack Map, giving administrators a clearer real-time view of cyber attacks targeting the protected system.
bodyhttps://youtu.be/wsWpcQZ46Bs SecPoint® Protector™ V69 introduces an improved Live Intrusion Prevention Attack Map, giving administrators a clearer real-time view of cyber attacks targeting the protected system. The enhanced map visualizes incoming attack activity with animated attack paths from unique attack origins to the protected network, making it easier to understand where attacks are coming from and how the Intrusion Prevention system is actively responding. This improvement helps security teams quickly see attack patterns, identify hostile regions, and gain a more intuitive overview of live threat activity directly inside the SecPoint® Protector™ firewall interface. With SecPoint® Protector™ V69, real-time cyber attack visibility becomes clearer, more visual, and easier to understand. Learn more about SecPoint® Protector™ https://www.secpoint.com/protector.html Download the latest SecPoint® Protector™ https://vip.secpoint.com Partner sign up: https://www.secpoint.com/partner-sign-up.html #SecPoint #CyberSecurity #Protector #Firewall #IntrusionPrevention
json metadata{"tags":["secpoint","cybersecurity","protector","firewall","intrusionprevention"],"image":["https://img.youtube.com/vi/wsWpcQZ46Bs/0.jpg"],"links":["https://youtu.be/wsWpcQZ46Bs","https://www.secpoint.com/protector.html","https://vip.secpoint.com","https://www.secpoint.com/partner-sign-up.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105589662/Trx 8d28ca197303b95b0bad4513e111fefbfe9068a0
View Raw JSON Data
{
  "trx_id": "8d28ca197303b95b0bad4513e111fefbfe9068a0",
  "block": 105589662,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-28T17:14:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-tm-v69-introduces-an-improved-live-intrusion-prevention-attack-map-giving-administrators-a-clearer-real",
      "title": "SecPoint® Protector™ V69 introduces an improved Live Intrusion Prevention Attack Map, giving administrators a clearer real-time view of cyber attacks targeting the protected system.",
      "body": "https://youtu.be/wsWpcQZ46Bs\nSecPoint® Protector™ V69 introduces an improved Live Intrusion Prevention Attack Map, giving administrators a clearer real-time view of cyber attacks targeting the protected system.\n\nThe enhanced map visualizes incoming attack activity with animated attack paths from unique attack origins to the protected network, making it easier to understand where attacks are coming from and how the Intrusion Prevention system is actively responding.\n\nThis improvement helps security teams quickly see attack patterns, identify hostile regions, and gain a more intuitive overview of live threat activity directly inside the SecPoint® Protector™ firewall interface.\n\nWith SecPoint® Protector™ V69, real-time cyber attack visibility becomes clearer, more visual, and easier to understand.\n\nLearn more about SecPoint® Protector™\nhttps://www.secpoint.com/protector.html\n\nDownload the latest SecPoint® Protector™\nhttps://vip.secpoint.com\n\nPartner sign up:\nhttps://www.secpoint.com/partner-sign-up.html\n\n#SecPoint #CyberSecurity #Protector #Firewall #IntrusionPrevention",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"protector\",\"firewall\",\"intrusionprevention\"],\"image\":[\"https://img.youtube.com/vi/wsWpcQZ46Bs/0.jpg\"],\"links\":[\"https://youtu.be/wsWpcQZ46Bs\",\"https://www.secpoint.com/protector.html\",\"https://vip.secpoint.com\",\"https://www.secpoint.com/partner-sign-up.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/17 12:38:33
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-at-connect4cyber-stockholm
titleSecPoint at Connect4Cyber Stockholm
bodySecPoint at Connect4Cyber Stockholm SecPoint is pleased to participate in the Connect4Cyber pitching session in Stockholm on 23 April. At the event, Victor M. Christiansenn, CEO & Founder of SecPoint, will present SecPoint’s perspective on European on-prem cybersecurity for resilient critical infrastructure, with a focus on collaboration, operational resilience, and trusted European cybersecurity capabilities. Connect4Cyber brings together organisations across Europe around Horizon Europe cybersecurity opportunities, consortium building, and knowledge exchange. We look forward to meeting potential project partners, pilot organisations, VARs/VADs/distributors, and other European technology partners. We appreciate the organisers for creating a strong platform for cybersecurity dialogue and cooperation across Europe. https://www.ncc-se.se/en/events/connect4cyber--info-and-brokerage-day-23-april-2026/ #SecPoint #Connect4Cyber #CyberSecurity #HorizonEurope #CriticalInfrastructure ![secpoint-connect4cyber-stockholm-april-2026.jpg](https://cdn.steemitimages.com/DQmf1qUfR9mcCWAdi6YGVW4wgL3xE4bS9L475PTNtWZKXNa/secpoint-connect4cyber-stockholm-april-2026.jpg)
json metadata{"tags":["secpoint","cybersecurity","connect4cyber","horizoneurope","criticalinfrastructure"],"image":["https://cdn.steemitimages.com/DQmf1qUfR9mcCWAdi6YGVW4wgL3xE4bS9L475PTNtWZKXNa/secpoint-connect4cyber-stockholm-april-2026.jpg"],"links":["https://www.ncc-se.se/en/events/connect4cyber--info-and-brokerage-day-23-april-2026/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105268097/Trx 0e5daa08ddc7559298e7f7c1ae721b878e0fab80
View Raw JSON Data
{
  "trx_id": "0e5daa08ddc7559298e7f7c1ae721b878e0fab80",
  "block": 105268097,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-17T12:38:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-at-connect4cyber-stockholm",
      "title": "SecPoint at Connect4Cyber Stockholm",
      "body": "SecPoint at Connect4Cyber Stockholm\n\nSecPoint is pleased to participate in the Connect4Cyber pitching session in Stockholm on 23 April.\n\nAt the event, Victor M. Christiansenn, CEO & Founder of SecPoint, will present SecPoint’s perspective on European on-prem cybersecurity for resilient critical infrastructure, with a focus on collaboration, operational resilience, and trusted European cybersecurity capabilities.\n\nConnect4Cyber brings together organisations across Europe around Horizon Europe cybersecurity opportunities, consortium building, and knowledge exchange. \nWe look forward to meeting potential project partners, pilot organisations, VARs/VADs/distributors, and other European technology partners.\n\nWe appreciate the organisers for creating a strong platform for cybersecurity dialogue and cooperation across Europe.\n\nhttps://www.ncc-se.se/en/events/connect4cyber--info-and-brokerage-day-23-april-2026/\n\n#SecPoint #Connect4Cyber #CyberSecurity #HorizonEurope #CriticalInfrastructure\n![secpoint-connect4cyber-stockholm-april-2026.jpg](https://cdn.steemitimages.com/DQmf1qUfR9mcCWAdi6YGVW4wgL3xE4bS9L475PTNtWZKXNa/secpoint-connect4cyber-stockholm-april-2026.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"connect4cyber\",\"horizoneurope\",\"criticalinfrastructure\"],\"image\":[\"https://cdn.steemitimages.com/DQmf1qUfR9mcCWAdi6YGVW4wgL3xE4bS9L475PTNtWZKXNa/secpoint-connect4cyber-stockholm-april-2026.jpg\"],\"links\":[\"https://www.ncc-se.se/en/events/connect4cyber--info-and-brokerage-day-23-april-2026/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/15 14:41:06
parent author
parent permlinksecpoint
authorsecpoint
permlink6aqd4n-stay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69
titleStay tuned for the upcoming SecPoint® Protector™ V69
bodyhttps://www.youtube.com/watch?v=SRYKMUs9YsE Stay tuned for the upcoming SecPoint® Protector™ V69. This short preview video gives a first look at the improved Attack Map, designed to provide a clearer and more immediate overview of recent attack activity. Some of the biggest highlights in V69 include: • Improved Attack Map with recent attack tracks shown directly on the map • Intrusion Prevention refinements, including reduced false positives and stronger analysis of incoming traffic • Improved platform reliability with better firmware update handling, database update improvements, and automatic GeoIP updates To download the latest SecPoint Protector & Penetrator, please visit: https://vip.secpoint.com #secpoint #protector #networksecurity #cybersecurity #firewall
json metadata{"tags":["secpoint","cybersecurity","cybersec","protector","networksecurity","firewall"],"image":["https://img.youtube.com/vi/SRYKMUs9YsE/0.jpg"],"links":["https://www.youtube.com/watch?v=SRYKMUs9YsE","https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105213091/Trx d8f6c2d9650af4ff352d9a2b8d2b78bf437b94ee
View Raw JSON Data
{
  "trx_id": "d8f6c2d9650af4ff352d9a2b8d2b78bf437b94ee",
  "block": 105213091,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-15T14:41:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "6aqd4n-stay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69",
      "title": "Stay tuned for the upcoming SecPoint® Protector™ V69",
      "body": "https://www.youtube.com/watch?v=SRYKMUs9YsE\nStay tuned for the upcoming SecPoint® Protector™ V69.\n\nThis short preview video gives a first look at the improved Attack Map, designed to provide a clearer and more immediate overview of recent attack activity.\n\nSome of the biggest highlights in V69 include:\n• Improved Attack Map with recent attack tracks shown directly on the map\n• Intrusion Prevention refinements, including reduced false positives and stronger analysis of incoming traffic\n• Improved platform reliability with better firmware update handling, database update improvements, and automatic GeoIP updates\n\nTo download the latest SecPoint Protector & Penetrator, please visit:\nhttps://vip.secpoint.com\n\n#secpoint #protector #networksecurity #cybersecurity #firewall",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersec\",\"protector\",\"networksecurity\",\"firewall\"],\"image\":[\"https://img.youtube.com/vi/SRYKMUs9YsE/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=SRYKMUs9YsE\",\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/13 11:05:06
parent author
parent permlinksecpoint
authorsecpoint
permlinkonly-8-days-left-until-the-future-of-cyberdefence-conference-on-tuesday-april-21-in-skopje-north-macedonia
titleOnly 8 days left until The Future of Cyberdefence Conference on Tuesday, April 21, in Skopje, North Macedonia
bodyOnly 8 days left until The Future of Cyberdefence Conference on Tuesday, April 21, in Skopje, North Macedonia. SecPoint is pleased to remind our partners and network that we will be participating in The Future of Cyberdefence Conference, hosted by our valued VAD partner, Data Ally. The event will take place at the DoubleTree by Hilton Skopje and will bring together selected decision-makers, IT leaders, and cybersecurity professionals across dedicated sales and technical tracks. At the event, Victor M. Christiansenn will present SecPoint’s European-developed cybersecurity solutions, including advanced vulnerability scanning, dark web intelligence, compliance profiling, and intelligent threat prevention technologies designed to strengthen organizational cyber resilience. Visitors are also welcome to stop by and receive a signed copy of Victor’s new book, How They Hack You. We appreciate Data Ally’s initiative in arranging this executive forum and their continued commitment to promoting European cybersecurity innovation in the region. For further information regarding participation and partnership opportunities, please visit the registration link below: https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE Data Ally #CyberSecurity #SecPoint #DataAlly #DarkWeb #VulnerabilityScanning ![dataally-skopje-1--april-2026.png](https://cdn.steemitimages.com/DQme5h7DkT2qmDG2nJWGpuVfXBZ3thvAfGt4Y94BsFACf6r/dataally-skopje-1--april-2026.png) ![dataally-skopje-2-april-2026.jpg](https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg)
json metadata{"tags":["secpoint","cybersecurity","cybersec","dataally","darkweb","vulnerabilityscanning"],"image":["https://cdn.steemitimages.com/DQme5h7DkT2qmDG2nJWGpuVfXBZ3thvAfGt4Y94BsFACf6r/dataally-skopje-1--april-2026.png","https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg"],"links":["https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105151312/Trx d5ab0bb8233f5e20f37e8d674976f10750f6da6e
View Raw JSON Data
{
  "trx_id": "d5ab0bb8233f5e20f37e8d674976f10750f6da6e",
  "block": 105151312,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-13T11:05:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "only-8-days-left-until-the-future-of-cyberdefence-conference-on-tuesday-april-21-in-skopje-north-macedonia",
      "title": "Only 8 days left until The Future of Cyberdefence Conference on Tuesday, April 21, in Skopje, North Macedonia",
      "body": "Only 8 days left until The Future of Cyberdefence Conference on Tuesday, April 21, in Skopje, North Macedonia.\n\nSecPoint is pleased to remind our partners and network that we will be participating in The Future of Cyberdefence Conference, hosted by our valued VAD partner, Data Ally.\n\nThe event will take place at the DoubleTree by Hilton Skopje and will bring together selected decision-makers, IT leaders, and cybersecurity professionals across dedicated sales and technical tracks.\n\nAt the event, Victor M. Christiansenn will present SecPoint’s European-developed cybersecurity solutions, including advanced vulnerability scanning, dark web intelligence, compliance profiling, and intelligent threat prevention technologies designed to strengthen organizational cyber resilience.\n\nVisitors are also welcome to stop by and receive a signed copy of Victor’s new book, How They Hack You.\n\nWe appreciate Data Ally’s initiative in arranging this executive forum and their continued commitment to promoting European cybersecurity innovation in the region.\n\nFor further information regarding participation and partnership opportunities, please visit the registration link below:\nhttps://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE\n\nData Ally\n\n#CyberSecurity #SecPoint #DataAlly #DarkWeb #VulnerabilityScanning\n![dataally-skopje-1--april-2026.png](https://cdn.steemitimages.com/DQme5h7DkT2qmDG2nJWGpuVfXBZ3thvAfGt4Y94BsFACf6r/dataally-skopje-1--april-2026.png)\n\n![dataally-skopje-2-april-2026.jpg](https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersec\",\"dataally\",\"darkweb\",\"vulnerabilityscanning\"],\"image\":[\"https://cdn.steemitimages.com/DQme5h7DkT2qmDG2nJWGpuVfXBZ3thvAfGt4Y94BsFACf6r/dataally-skopje-1--april-2026.png\",\"https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg\"],\"links\":[\"https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/10 12:22:12
voterakdx
authorsecpoint
permlinkstay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69
weight6500 (65.00%)
Transaction InfoBlock #105066667/Trx d3646d5f130534bed3294a3de4ef6e3923fb76f1
View Raw JSON Data
{
  "trx_id": "d3646d5f130534bed3294a3de4ef6e3923fb76f1",
  "block": 105066667,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-10T12:22:12",
  "op": [
    "vote",
    {
      "voter": "akdx",
      "author": "secpoint",
      "permlink": "stay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69",
      "weight": 6500
    }
  ]
}
2026/04/10 11:33:39
parent author
parent permlinksecpoint
authorsecpoint
permlinkstay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69
titleStay tuned for the upcoming SecPoint® Protector™ V69
body![SecPoint-Protector-V69-SneakPreview.jpg](https://cdn.steemitimages.com/DQmc3neSutBNQWrG5zmbuAL8fS59jrgPwDZ7yrYkfQGU9uR/SecPoint-Protector-V69-SneakPreview.jpg) Stay tuned for the upcoming SecPoint® Protector™ V69. Here is a first sneak preview of the improved Attack Map, designed to give a clearer overview of the most recent attack activity. Some of the biggest highlights in V69 include: • Improved Attack Map with recent attack tracks shown directly on the map • Intrusion Prevention refinements, including reduced false positives and stronger analysis of incoming traffic • Improved platform reliability with better firmware update handling, database update improvements, and automatic GeoIP updates To download the latest SecPoint Protector & Penetrator please visit https://vip.secpoint.com #secpoint #protector #networksecurity #cybersecurity #firewall
json metadata{"tags":["secpoint","cybersec","protector","networksecurity","cybersecurity","firewall"],"image":["https://cdn.steemitimages.com/DQmc3neSutBNQWrG5zmbuAL8fS59jrgPwDZ7yrYkfQGU9uR/SecPoint-Protector-V69-SneakPreview.jpg"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105065697/Trx 4949809bdf825ddfb7f4a55ecacfdac95975e902
View Raw JSON Data
{
  "trx_id": "4949809bdf825ddfb7f4a55ecacfdac95975e902",
  "block": 105065697,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-10T11:33:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "stay-tuned-for-the-upcoming-secpoint-r-protector-tm-v69",
      "title": "Stay tuned for the upcoming SecPoint® Protector™ V69",
      "body": "![SecPoint-Protector-V69-SneakPreview.jpg](https://cdn.steemitimages.com/DQmc3neSutBNQWrG5zmbuAL8fS59jrgPwDZ7yrYkfQGU9uR/SecPoint-Protector-V69-SneakPreview.jpg)\nStay tuned for the upcoming SecPoint® Protector™ V69.\n\n\n\nHere is a first sneak preview of the improved Attack Map, designed to give a clearer overview of the most recent attack activity.\n\n\n\nSome of the biggest highlights in V69 include:\n\n• Improved Attack Map with recent attack tracks shown directly on the map\n\n• Intrusion Prevention refinements, including reduced false positives and stronger analysis of incoming traffic\n\n• Improved platform reliability with better firmware update handling, database update improvements, and automatic GeoIP updates\n\n\n\nTo download the latest SecPoint Protector & Penetrator please visit https://vip.secpoint.com \n\n\n\n#secpoint #protector #networksecurity #cybersecurity #firewall",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersec\",\"protector\",\"networksecurity\",\"cybersecurity\",\"firewall\"],\"image\":[\"https://cdn.steemitimages.com/DQmc3neSutBNQWrG5zmbuAL8fS59jrgPwDZ7yrYkfQGU9uR/SecPoint-Protector-V69-SneakPreview.jpg\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/09 21:03:42
votercallmeraph
authorsecpoint
permlinksecpoint-r-penetrator-tm-v67-scan-profile-information-in-reports
weight700 (7.00%)
Transaction InfoBlock #105048337/Trx 1cba60edee6da72f3b3c4bda0eba97e5472b4516
View Raw JSON Data
{
  "trx_id": "1cba60edee6da72f3b3c4bda0eba97e5472b4516",
  "block": 105048337,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-09T21:03:42",
  "op": [
    "vote",
    {
      "voter": "callmeraph",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v67-scan-profile-information-in-reports",
      "weight": 700
    }
  ]
}
2026/04/09 20:52:54
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-v67-scan-profile-information-in-reports
titleSecPoint® Penetrator™ V67: Scan Profile Information in Reports
bodyhttps://www.youtube.com/watch?v=Jt0YPVnuXHo SecPoint® Penetrator™ V67: Scan Profile Information in Reports Clear documentation is essential for professional vulnerability reporting. With SecPoint Penetrator V67, reports now include a dedicated page describing the scan profile used during the assessment. This new section helps document the scan configuration and methodology behind the report, making it easier to support audit requirements and provide greater clarity for customers, partners, and internal teams. The new report page makes it easier to: ✔ Document the scan profile used during the assessment ✔ Improve reporting transparency and consistency ✔ Support audit and compliance requirements ✔ Include or exclude the section as needed when generating reports The scan profile information page is included in all newly generated reports and can be managed under System → Report Branding, where administrators can choose whether to keep or remove it. This enhancement provides clearer reporting and stronger documentation of how each assessment was performed. #SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #Compliance
json metadata{"tags":["secpoint","cybersecurity","compliance","penetrator","vulnerabilityscanning"],"image":["https://img.youtube.com/vi/Jt0YPVnuXHo/0.jpg"],"links":["https://www.youtube.com/watch?v=Jt0YPVnuXHo"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #105048121/Trx 35deefc1546b5f94043d1112c03f440fb2745733
View Raw JSON Data
{
  "trx_id": "35deefc1546b5f94043d1112c03f440fb2745733",
  "block": 105048121,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-09T20:52:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v67-scan-profile-information-in-reports",
      "title": "SecPoint® Penetrator™ V67: Scan Profile Information in Reports",
      "body": "https://www.youtube.com/watch?v=Jt0YPVnuXHo\n\nSecPoint® Penetrator™ V67: Scan Profile Information in Reports\n\nClear documentation is essential for professional vulnerability reporting. With SecPoint Penetrator V67, reports now include a dedicated page describing the scan profile used during the assessment.\n\nThis new section helps document the scan configuration and methodology behind the report, making it easier to support audit requirements and provide greater clarity for customers, partners, and internal teams.\n\nThe new report page makes it easier to:\n✔ Document the scan profile used during the assessment\n✔ Improve reporting transparency and consistency\n✔ Support audit and compliance requirements\n✔ Include or exclude the section as needed when generating reports\n\nThe scan profile information page is included in all newly generated reports and can be managed under System → Report Branding, where administrators can choose whether to keep or remove it.\n\nThis enhancement provides clearer reporting and stronger documentation of how each assessment was performed.\n\n#SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #Compliance",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"compliance\",\"penetrator\",\"vulnerabilityscanning\"],\"image\":[\"https://img.youtube.com/vi/Jt0YPVnuXHo/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=Jt0YPVnuXHo\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/02 11:05:36
parent author
parent permlinksecpoint
authorsecpoint
permlink3hxv5b-scan-your-sites-with-secpoint-penetrator-for-darksword-related-web-indicators
titleScan your sites with SecPoint Penetrator for DarkSword related web indicators
bodyScan your sites with SecPoint Penetrator for DarkSword related web indicators. DarkSword is a six flaw, three zero day iOS exploit chain observed against iOS 18.4 through 18.7. It has been linked to at least three distinct threat actors or clusters, underlining how advanced exploit chains can spread beyond a single operator If a compromised website becomes the delivery point, the result can be full device compromise and rapid data theft. This is not a niche issue. Researchers estimated that roughly 220 to 270 million iPhones were running exposed iOS versions at the time of disclosure. Platform adoption data published in February 2026 also showed that 34% of all iPhones transacting on the App Store were still not on iOS 26. Early detection matters. Your website should not become the next delivery channel. #SecPoint #CyberSecurity #ThreatIntel #iPhoneSecurity #VulnerabilityScanning ![SecPoint-DarkSword-iOS-Exploit.png](https://cdn.steemitimages.com/DQmXkc3QbZk1vsFvaUCfKijGNgBNAgoVoHusnnH1Hpzc7cf/SecPoint-DarkSword-iOS-Exploit.png)
json metadata{"tags":["secpoint","cybersecurity","threatintel","iphonesecurity","vulnerabilityscanning"],"image":["https://cdn.steemitimages.com/DQmXkc3QbZk1vsFvaUCfKijGNgBNAgoVoHusnnH1Hpzc7cf/SecPoint-DarkSword-iOS-Exploit.png"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104835269/Trx a50fadce72a71671a59cc2208a8cb071ffc72ae5
View Raw JSON Data
{
  "trx_id": "a50fadce72a71671a59cc2208a8cb071ffc72ae5",
  "block": 104835269,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-02T11:05:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "3hxv5b-scan-your-sites-with-secpoint-penetrator-for-darksword-related-web-indicators",
      "title": "Scan your sites with SecPoint Penetrator for DarkSword related web indicators",
      "body": "Scan your sites with SecPoint Penetrator for DarkSword related web indicators.\n\nDarkSword is a six flaw, three zero day iOS exploit chain observed against iOS 18.4 through 18.7. \n\nIt has been linked to at least three distinct threat actors or clusters, underlining how advanced exploit chains can spread beyond a single operator\n\nIf a compromised website becomes the delivery point, the result can be full device compromise and rapid data theft.\n\nThis is not a niche issue. Researchers estimated that roughly 220 to 270 million iPhones were running exposed iOS versions at the time of disclosure. \nPlatform adoption data published in February 2026 also showed that 34% of all iPhones transacting on the App Store were still not on iOS 26.\n\nEarly detection matters. Your website should not become the next delivery channel.\n\n#SecPoint #CyberSecurity #ThreatIntel #iPhoneSecurity #VulnerabilityScanning\n![SecPoint-DarkSword-iOS-Exploit.png](https://cdn.steemitimages.com/DQmXkc3QbZk1vsFvaUCfKijGNgBNAgoVoHusnnH1Hpzc7cf/SecPoint-DarkSword-iOS-Exploit.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"threatintel\",\"iphonesecurity\",\"vulnerabilityscanning\"],\"image\":[\"https://cdn.steemitimages.com/DQmXkc3QbZk1vsFvaUCfKijGNgBNAgoVoHusnnH1Hpzc7cf/SecPoint-DarkSword-iOS-Exploit.png\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/02 08:55:21
parent author
parent permlinksecpoint
authorsecpoint
permlinkscan-your-sites-with-secpoint-penetrator-for-darksword-related-web-indicators
titleScan your sites with SecPoint Penetrator for DarkSword related web indicators
bodyScan your sites with SecPoint Penetrator for DarkSword related web indicators. DarkSword is a six flaw, three zero day iOS exploit chain observed against iOS 18.4 through 18.7. It has been linked to at least three distinct threat actors or clusters, underlining how advanced exploit chains can spread beyond a single operator If a compromised website becomes the delivery point, the result can be full device compromise and rapid data theft. This is not a niche issue. Researchers estimated that roughly 220 to 270 million iPhones were running exposed iOS versions at the time of disclosure. Platform adoption data published in February 2026 also showed that 34% of all iPhones transacting on the App Store were still not on iOS 26. Early detection matters. Your website should not become the next delivery channel. #SecPoint #CyberSecurity #ThreatIntel #iPhoneSecurity #VulnerabilityScanning ![Uploading image #1...]()
json metadata{"tags":["secpoint","cybersecurity","cybersec","threatintel","iphonesecurity","vulnerabilityscanning"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104832721/Trx f975a9595a0ece490fea7afffef9929aa7a93100
View Raw JSON Data
{
  "trx_id": "f975a9595a0ece490fea7afffef9929aa7a93100",
  "block": 104832721,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-02T08:55:21",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "scan-your-sites-with-secpoint-penetrator-for-darksword-related-web-indicators",
      "title": "Scan your sites with SecPoint Penetrator for DarkSword related web indicators",
      "body": "Scan your sites with SecPoint Penetrator for DarkSword related web indicators.\n\nDarkSword is a six flaw, three zero day iOS exploit chain observed against iOS 18.4 through 18.7. \n\nIt has been linked to at least three distinct threat actors or clusters, underlining how advanced exploit chains can spread beyond a single operator\n\nIf a compromised website becomes the delivery point, the result can be full device compromise and rapid data theft.\n\nThis is not a niche issue. Researchers estimated that roughly 220 to 270 million iPhones were running exposed iOS versions at the time of disclosure. \nPlatform adoption data published in February 2026 also showed that 34% of all iPhones transacting on the App Store were still not on iOS 26.\n\nEarly detection matters. Your website should not become the next delivery channel.\n\n#SecPoint #CyberSecurity #ThreatIntel #iPhoneSecurity #VulnerabilityScanning\n![Uploading image #1...]()",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersec\",\"threatintel\",\"iphonesecurity\",\"vulnerabilityscanning\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/04/01 16:55:57
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-v67-new-cwe-and-cra-compliance-profiles
titleSecPoint® Penetrator™ V67: New CWE and CRA Compliance Profiles
bodyhttps://www.youtube.com/watch?v=ZdM-FGUNLFE SecPoint® Penetrator™ V67: New CWE and CRA Compliance Profiles SecPoint Penetrator V67 introduces two important new profiles focused on stronger vulnerability classification and compliance support: CWE and CRA. The new CWE profile helps map findings more precisely to the MITRE Common Weakness Enumeration (CWE) framework, giving clearer insight into the underlying causes of vulnerabilities and supporting stronger remediation, developer-focused reporting, and more secure development practices. This is the most accurate wording because CWE is the broader weakness framework, while the well-known Top 25 is a list derived from that framework. Earlier MITRE archives include a 2011 CWE/SANS Top 25, while current editions are published as the CWE Top 25. The new CRA profile is designed to support organizations working with modern cybersecurity compliance requirements. It helps structure vulnerability assessments in line with the EU Cyber Resilience Act, which establishes common cybersecurity requirements for products with digital elements, including software and hardware, throughout their lifecycle. With these additions, SecPoint Penetrator V67 helps organizations improve root cause visibility, strengthen remediation workflows, support secure coding efforts, and align vulnerability management with modern security and compliance expectations. Login to https://vip.secpoint.com/ to download the latest SecPoint Penetrator version available in multiple formats including Proxmox. #SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #Compliance
json metadata{"tags":["secpoint","cybersecurity","vulnerabilityscanning","penetrator","compliance"],"image":["https://img.youtube.com/vi/ZdM-FGUNLFE/0.jpg"],"links":["https://www.youtube.com/watch?v=ZdM-FGUNLFE","https://vip.secpoint.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104813576/Trx 276e5620f65d1ceeae3999a254049ce47145225a
View Raw JSON Data
{
  "trx_id": "276e5620f65d1ceeae3999a254049ce47145225a",
  "block": 104813576,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-01T16:55:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v67-new-cwe-and-cra-compliance-profiles",
      "title": "SecPoint® Penetrator™ V67: New CWE and CRA Compliance Profiles",
      "body": "https://www.youtube.com/watch?v=ZdM-FGUNLFE\nSecPoint® Penetrator™ V67: New CWE and CRA Compliance Profiles\n\nSecPoint Penetrator V67 introduces two important new profiles focused on stronger vulnerability classification and compliance support: CWE and CRA.\n\nThe new CWE profile helps map findings more precisely to the MITRE Common Weakness Enumeration (CWE) framework, giving clearer insight into the underlying causes of vulnerabilities and supporting stronger remediation, developer-focused reporting, and more secure development practices. This is the most accurate wording because CWE is the broader weakness framework, while the well-known Top 25 is a list derived from that framework. Earlier MITRE archives include a 2011 CWE/SANS Top 25, while current editions are published as the CWE Top 25.\n\nThe new CRA profile is designed to support organizations working with modern cybersecurity compliance requirements. It helps structure vulnerability assessments in line with the EU Cyber Resilience Act, which establishes common cybersecurity requirements for products with digital elements, including software and hardware, throughout their lifecycle.\n\nWith these additions, SecPoint Penetrator V67 helps organizations improve root cause visibility, strengthen remediation workflows, support secure coding efforts, and align vulnerability management with modern security and compliance expectations.\n\nLogin to https://vip.secpoint.com/ to download the latest SecPoint Penetrator version available in multiple formats including Proxmox.\n\n#SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #Compliance",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"vulnerabilityscanning\",\"penetrator\",\"compliance\"],\"image\":[\"https://img.youtube.com/vi/ZdM-FGUNLFE/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=ZdM-FGUNLFE\",\"https://vip.secpoint.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/30 22:00:18
parent author
parent permlinksecpoint
authorsecpoint
permlinkyou-do-not-get-hacked-only-because-of-bad-systems
titleYou do not get hacked only because of bad systems
bodyhttps://www.youtube.com/shorts/UgjyyMTi1T8 You do not get hacked only because of bad systems. You get hacked because of human mistakes too. One wrong click, one open port, one exposed tool, and the attacker gets in. Log in to https://vip.secpoint.com to download the latest SecPoint Penetrator & SecPoint Protector #secpoint #cybersecurity #infosec #networksecurity #cyber
json metadata{"tags":["secpoint","cybersecurity","infosec","networksecurity","cyber"],"image":["https://img.youtube.com/vi/UgjyyMTi1T8/0.jpg"],"links":["https://www.youtube.com/shorts/UgjyyMTi1T8","https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104762182/Trx b724567092ecd6bd94901534c3fce80c058536c9
View Raw JSON Data
{
  "trx_id": "b724567092ecd6bd94901534c3fce80c058536c9",
  "block": 104762182,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-30T22:00:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "you-do-not-get-hacked-only-because-of-bad-systems",
      "title": "You do not get hacked only because of bad systems",
      "body": "https://www.youtube.com/shorts/UgjyyMTi1T8\nYou do not get hacked only because of bad systems. \nYou get hacked because of human mistakes too. \nOne wrong click, one open port, one exposed tool, and the attacker gets in. \n\nLog in to https://vip.secpoint.com to download the latest SecPoint Penetrator & SecPoint Protector\n\n#secpoint #cybersecurity #infosec #networksecurity #cyber",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"infosec\",\"networksecurity\",\"cyber\"],\"image\":[\"https://img.youtube.com/vi/UgjyyMTi1T8/0.jpg\"],\"links\":[\"https://www.youtube.com/shorts/UgjyyMTi1T8\",\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/25 07:40:30
parent authorsecpoint
parent permlinksecpoint-penetrator-v67-brings-major-network-discovery-speed-enhancements
authorjoestarjo
permlinktcg2ni
title
bodyI’ve used their <a href="https://thedarkvr.su/">ip stress test</a> a couple of times to check how my setup behaves under heavy load, and it saved me from a few nasty surprises later. The API option made it easy to automate repeating tests, and the low latency nodes kept things consistent. Crypto payments were smooth too, which was handy since I didn’t want to use my main billing info.
json metadata{"links":["https://thedarkvr.su/"],"app":"steemit/0.2"}
Transaction InfoBlock #104601665/Trx cf2a573ef873c208b941fd052edc5a4fef3a1c12
View Raw JSON Data
{
  "trx_id": "cf2a573ef873c208b941fd052edc5a4fef3a1c12",
  "block": 104601665,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-25T07:40:30",
  "op": [
    "comment",
    {
      "parent_author": "secpoint",
      "parent_permlink": "secpoint-penetrator-v67-brings-major-network-discovery-speed-enhancements",
      "author": "joestarjo",
      "permlink": "tcg2ni",
      "title": "",
      "body": "I’ve used their <a href=\"https://thedarkvr.su/\">ip stress test</a> a couple of times to check how my setup behaves under heavy load, and it saved me from a few nasty surprises later. The API option made it easy to automate repeating tests, and the low latency nodes kept things consistent. Crypto payments were smooth too, which was handy since I didn’t want to use my main billing info.",
      "json_metadata": "{\"links\":[\"https://thedarkvr.su/\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
2026/03/20 07:20:48
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-v67-front-page-system-and-cpu-load-charts
titleSecPoint® Penetrator™ V67: Front Page System & CPU Load Charts
bodySecPoint® Penetrator™ V67: Front Page System & CPU Load Charts Security teams need clear, real-time insight into system performance during vulnerability scans. With the new front page information boxes in SecPoint Penetrator V67, administrators can now monitor System Load and CPU Load directly from the dashboard. These new charts provide immediate visibility into appliance performance, helping identify bottlenecks and ensure smooth operation during scans and scheduled tasks. The front page charts make it easier to: ✔ Monitor system and CPU load in real time ✔ Identify performance bottlenecks quickly ✔ Improve operational awareness during scans ✔ Optimize system performance and resource usage The charts can be configured under System → Home Page Charts, allowing full control over visibility, refresh intervals, and customization. This improves transparency and helps ensure efficient and stable vulnerability scanning. #SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #NetworkSecurity https://www.youtube.com/watch?v=23q2iwPstmA
json metadata{"tags":["secpoint","cybersecurity","penetrator","vulnerabilityscanning","networksecurity"],"image":["https://img.youtube.com/vi/23q2iwPstmA/0.jpg"],"links":["https://www.youtube.com/watch?v=23q2iwPstmA"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104459030/Trx 68459a0674a0a12e5c15cd202636fb43266cf288
View Raw JSON Data
{
  "trx_id": "68459a0674a0a12e5c15cd202636fb43266cf288",
  "block": 104459030,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-20T07:20:48",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v67-front-page-system-and-cpu-load-charts",
      "title": "SecPoint® Penetrator™ V67: Front Page System & CPU Load Charts",
      "body": "SecPoint® Penetrator™ V67: Front Page System & CPU Load Charts\n\nSecurity teams need clear, real-time insight into system performance during vulnerability scans. With the new front page information boxes in SecPoint Penetrator V67, administrators can now monitor System Load and CPU Load directly from the dashboard.\n\nThese new charts provide immediate visibility into appliance performance, helping identify bottlenecks and ensure smooth operation during scans and scheduled tasks.\n\nThe front page charts make it easier to:\n✔ Monitor system and CPU load in real time\n✔ Identify performance bottlenecks quickly\n✔ Improve operational awareness during scans\n✔ Optimize system performance and resource usage\n\nThe charts can be configured under System → Home Page Charts, allowing full control over visibility, refresh intervals, and customization.\n\nThis improves transparency and helps ensure efficient and stable vulnerability scanning.\n\n#SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #NetworkSecurity\n\nhttps://www.youtube.com/watch?v=23q2iwPstmA",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"vulnerabilityscanning\",\"networksecurity\"],\"image\":[\"https://img.youtube.com/vi/23q2iwPstmA/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=23q2iwPstmA\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/18 17:00:21
parent author
parent permlinksecpoint
authorsecpoint
permlinknew-feature-in-secpoint-r-penetrator-tm-v67-cvss-v3-support
titleNew feature in SecPoint® Penetrator™ V67: CVSS v3 Support
bodyNew feature in SecPoint® Penetrator™ V67: CVSS v3 Support Security teams need clear vulnerability scoring to prioritize remediation effectively. With CVSS v3 support in SecPoint Penetrator V67, scan results can now be reviewed using standardized severity scoring for better risk evaluation and faster decision-making. CVSS v3 support makes it easier to: ✔ Understand vulnerability severity clearly ✔ Prioritize remediation faster ✔ Improve internal risk evaluation ✔ Strengthen reporting consistency ✔ Support more efficient vulnerability management Watch the short video below. https://www.youtube.com/watch?v=0cUwPaPT7O8 #SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #NetworkSecurity
json metadata{"tags":["secpoint","cybersecurity","penetrator","vulnerabilityscanning","networksecurity"],"image":["https://img.youtube.com/vi/0cUwPaPT7O8/0.jpg"],"links":["https://www.youtube.com/watch?v=0cUwPaPT7O8"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104414313/Trx 798931984fd5137661f2cdcac6f11900d8257989
View Raw JSON Data
{
  "trx_id": "798931984fd5137661f2cdcac6f11900d8257989",
  "block": 104414313,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-18T17:00:21",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "new-feature-in-secpoint-r-penetrator-tm-v67-cvss-v3-support",
      "title": "New feature in SecPoint® Penetrator™ V67: CVSS v3 Support",
      "body": "New feature in SecPoint® Penetrator™ V67: CVSS v3 Support\n\nSecurity teams need clear vulnerability scoring to prioritize remediation effectively. \nWith CVSS v3 support in SecPoint Penetrator V67, scan results can now be reviewed using standardized severity scoring for better risk evaluation and faster decision-making.\n\nCVSS v3 support makes it easier to:\n✔ Understand vulnerability severity clearly\n✔ Prioritize remediation faster\n✔ Improve internal risk evaluation\n✔ Strengthen reporting consistency\n✔ Support more efficient vulnerability management\n\nWatch the short video below.\nhttps://www.youtube.com/watch?v=0cUwPaPT7O8\n\n\n#SecPoint #Penetrator #CyberSecurity #VulnerabilityScanning #NetworkSecurity",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"vulnerabilityscanning\",\"networksecurity\"],\"image\":[\"https://img.youtube.com/vi/0cUwPaPT7O8/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=0cUwPaPT7O8\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/16 16:35:30
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-to-participate-in-the-future-of-cyberdefence-conference
titleSecPoint to Participate in The Future of Cyberdefence Conference
bodySecPoint to Participate in The Future of Cyberdefence Conference, April 21, Skopje, North Macedonia SecPoint is pleased to announce our participation in The Future of Cyberdefence Conference, taking place on April 21 in Skopje, North Macedonia, and hosted by our valued VAD partner, Data Ally. The event will take place at the DoubleTree by Hilton Skopje and will bring together selected decision-makers, IT leaders, and cybersecurity professionals across dedicated sales and technical tracks. At the event, Victor M. Christiansenn will present SecPoint’s European-developed cybersecurity solutions, including advanced vulnerability scanning, dark web intelligence, compliance profiling, and intelligent threat prevention technologies designed to strengthen organizational cyber resilience. Visitors are also welcome to stop by and receive a signed copy of Victor’s new book, How They Hack You. We appreciate Data Ally’s initiative in arranging this executive forum and their continued commitment to promoting European cybersecurity innovation in the region. For further information regarding participation and partnership opportunities, please visit the registration link below: https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE #CyberSecurity #SecPoint #DataAlly #DarkWeb #VulnerabilityScanning ![dataally-skopje-1-april-2026.png](https://cdn.steemitimages.com/DQmcAJkduk23s4mT25WpvNU9Eg6r9SpoBP793UgVoPZc9uV/dataally-skopje-1-april-2026.png) ![dataally-skopje-2-april-2026.jpg](https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg)
json metadata{"tags":["secpoint","cybersecurity","dataally","darkweb","vulnerabilityscanning"],"image":["https://cdn.steemitimages.com/DQmcAJkduk23s4mT25WpvNU9Eg6r9SpoBP793UgVoPZc9uV/dataally-skopje-1-april-2026.png","https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg"],"links":["https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104356348/Trx e997f3eaab214ebe4b0d978210ecde36824f06c1
View Raw JSON Data
{
  "trx_id": "e997f3eaab214ebe4b0d978210ecde36824f06c1",
  "block": 104356348,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-16T16:35:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-to-participate-in-the-future-of-cyberdefence-conference",
      "title": "SecPoint to Participate in The Future of Cyberdefence Conference",
      "body": "SecPoint to Participate in The Future of Cyberdefence Conference, April 21, Skopje, North Macedonia\n\nSecPoint is pleased to announce our participation in The Future of Cyberdefence Conference, taking place on April 21 in Skopje, North Macedonia, and hosted by our valued VAD partner, Data Ally.\n\nThe event will take place at the DoubleTree by Hilton Skopje and will bring together selected decision-makers, IT leaders, and cybersecurity professionals across dedicated sales and technical tracks.\n\nAt the event, Victor M. Christiansenn will present SecPoint’s European-developed cybersecurity solutions, including advanced vulnerability scanning, dark web intelligence, compliance profiling, and intelligent threat prevention technologies designed to strengthen organizational cyber resilience.\n\nVisitors are also welcome to stop by and receive a signed copy of Victor’s new book, How They Hack You.\n\nWe appreciate Data Ally’s initiative in arranging this executive forum and their continued commitment to promoting European cybersecurity innovation in the region.\n\nFor further information regarding participation and partnership opportunities, please visit the registration link below:\n\nhttps://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE\n\n#CyberSecurity #SecPoint #DataAlly #DarkWeb #VulnerabilityScanning\n![dataally-skopje-1-april-2026.png](https://cdn.steemitimages.com/DQmcAJkduk23s4mT25WpvNU9Eg6r9SpoBP793UgVoPZc9uV/dataally-skopje-1-april-2026.png)\n\n![dataally-skopje-2-april-2026.jpg](https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"dataally\",\"darkweb\",\"vulnerabilityscanning\"],\"image\":[\"https://cdn.steemitimages.com/DQmcAJkduk23s4mT25WpvNU9Eg6r9SpoBP793UgVoPZc9uV/dataally-skopje-1-april-2026.png\",\"https://cdn.steemitimages.com/DQmcJFrE1Myvygq5XAP5F5vArP6HS8HVsX2j1HRZGuKiY2A/dataally-skopje-2-april-2026.jpg\"],\"links\":[\"https://forms.data-ally.com/dataally/form/EventInvitation/formperma/u4z-2h2OxLgJPLKF9zw8ImG-pf-4c1eIPHU-6hqtsDE\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/16 14:46:33
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-penetrator-v67-brings-major-network-discovery-speed-enhancements
titleSecPoint Penetrator V67 brings major network discovery speed enhancements
bodySecPoint Penetrator V67 brings major network discovery speed enhancements. The Full Scan Profile has been updated with major performance improvements for full-range TCP port scanning across 65K ports, helping support fast and effective large-scale assessments. Log in to https://vip.secpoint.com to download the latest release. #secpoint #penetrator #cybersecurity #networksecurity #vulnerabilityscanner ![SecPoint-V67-Speed.png](https://cdn.steemitimages.com/DQmPfMeePfuhBqAu1wSwscM9Lj3bBcFk6Lk2iwVPEE9hkB5/SecPoint-V67-Speed.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","networksecurity","vulnerabilityscanner"],"image":["https://cdn.steemitimages.com/DQmPfMeePfuhBqAu1wSwscM9Lj3bBcFk6Lk2iwVPEE9hkB5/SecPoint-V67-Speed.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104354170/Trx 590cffec8d2e5d3562f91d7b753041b3cbadbfcd
View Raw JSON Data
{
  "trx_id": "590cffec8d2e5d3562f91d7b753041b3cbadbfcd",
  "block": 104354170,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-16T14:46:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-penetrator-v67-brings-major-network-discovery-speed-enhancements",
      "title": "SecPoint Penetrator V67 brings major network discovery speed enhancements",
      "body": "SecPoint Penetrator V67 brings major network discovery speed enhancements.\n\nThe Full Scan Profile has been updated with major performance improvements for full-range TCP port scanning across 65K ports, helping support fast and effective large-scale assessments.\n\nLog in to https://vip.secpoint.com to download the latest release.\n\n#secpoint #penetrator #cybersecurity #networksecurity #vulnerabilityscanner\n![SecPoint-V67-Speed.png](https://cdn.steemitimages.com/DQmPfMeePfuhBqAu1wSwscM9Lj3bBcFk6Lk2iwVPEE9hkB5/SecPoint-V67-Speed.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"networksecurity\",\"vulnerabilityscanner\"],\"image\":[\"https://cdn.steemitimages.com/DQmPfMeePfuhBqAu1wSwscM9Lj3bBcFk6Lk2iwVPEE9hkB5/SecPoint-V67-Speed.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/16 10:12:39
parent author
parent permlinksecpoint
authorsecpoint
permlinkthe-latest-secpoint-manuals-are-now-available-for-download
titleThe latest SecPoint manuals are now available for download!
bodyThe latest SecPoint manuals are now available for download! The documentation has been updated to reflect the newest platform releases: SecPoint Penetrator firmware v67 SecPoint Protector firmware v68 The updated manuals include the latest improvements, features, usability enhancements, and platform refinements across both solutions. Log in to https://vip.secpoint.com to download the latest manuals. #secpoint #penetrator #protector #cybersecurity #vulnerabilitymanagement #firewall #infosec ![SecPoint-Penetrator-Manual-March-2026.png](https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png) ![SecPoint-Penetrator-Manual-March-2026.png](https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","protector","vulnerabilitymanagement","firewall","infosec"],"image":["https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104348707/Trx ab49158a41631c291f8f3c575618a87d294b0822
View Raw JSON Data
{
  "trx_id": "ab49158a41631c291f8f3c575618a87d294b0822",
  "block": 104348707,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-16T10:12:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "the-latest-secpoint-manuals-are-now-available-for-download",
      "title": "The latest SecPoint manuals are now available for download!",
      "body": "The latest SecPoint manuals are now available for download!\n\nThe documentation has been updated to reflect the newest platform releases:\n\nSecPoint Penetrator firmware v67\n\nSecPoint Protector firmware v68\n\nThe updated manuals include the latest improvements, features, usability enhancements, and platform refinements across both solutions.\n\nLog in to https://vip.secpoint.com to download the latest manuals.\n\n#secpoint #penetrator #protector #cybersecurity #vulnerabilitymanagement #firewall #infosec\n\n![SecPoint-Penetrator-Manual-March-2026.png](https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png)\n\n![SecPoint-Penetrator-Manual-March-2026.png](https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"protector\",\"vulnerabilitymanagement\",\"firewall\",\"infosec\"],\"image\":[\"https://cdn.steemitimages.com/DQmdaSy7JWyz9KTpXcxViBR7Xpx4seuNsP3ZHrvJ8F2K2V3/SecPoint-Penetrator-Manual-March-2026.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/11 22:46:27
parent author
parent permlinkcybersecurity
authorsecpoint
permlinknew-feature-in-secpoint-r-penetrator-tm-v67-xls-reporting
titleNew feature in SecPoint® Penetrator™ V67: XLS Reporting
bodyhttps://www.youtube.com/watch?v=Il6f3iDHgtM New feature in SecPoint® Penetrator™ V67: XLS Reporting Security teams often need more flexibility when working with vulnerability scan results. With the new XLS report format, scan data can now be easily analyzed, filtered, and integrated into internal workflows or compliance documentation. The XLS export makes it simple to: ✔ Sort and filter vulnerabilities ✔ Share results with management or developers ✔ Integrate findings into internal reporting processes This improves visibility and makes vulnerability management more efficient. Watch the short demo below. #SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #Infosec
json metadata{"tags":["cybersecurity","secpoint","vulnerabilityscanning","networksecurity","infosec"],"image":["https://img.youtube.com/vi/Il6f3iDHgtM/0.jpg"],"links":["https://www.youtube.com/watch?v=Il6f3iDHgtM"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104220052/Trx b339f340b7fe3e7738550214357589f97faee81d
View Raw JSON Data
{
  "trx_id": "b339f340b7fe3e7738550214357589f97faee81d",
  "block": 104220052,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-11T22:46:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "secpoint",
      "permlink": "new-feature-in-secpoint-r-penetrator-tm-v67-xls-reporting",
      "title": "New feature in SecPoint® Penetrator™ V67: XLS Reporting",
      "body": "https://www.youtube.com/watch?v=Il6f3iDHgtM\nNew feature in SecPoint® Penetrator™ V67: XLS Reporting\n\nSecurity teams often need more flexibility when working with vulnerability scan results. With the new XLS report format, scan data can now be easily analyzed, filtered, and integrated into internal workflows or compliance documentation.\n\nThe XLS export makes it simple to:\n✔ Sort and filter vulnerabilities\n✔ Share results with management or developers\n✔ Integrate findings into internal reporting processes\n\nThis improves visibility and makes vulnerability management more efficient.\n\nWatch the short demo below.\n\n#SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #Infosec",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"secpoint\",\"vulnerabilityscanning\",\"networksecurity\",\"infosec\"],\"image\":[\"https://img.youtube.com/vi/Il6f3iDHgtM/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=Il6f3iDHgtM\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/11 11:56:06
parent author
parent permlinkshadowai
authorsecpoint
permlinkshadow-ai-is-becoming-a-growing-business-risk
titleShadow AI is becoming a growing business risk
body![SecPoint-Shadow-AI-Risk.png](https://cdn.steemitimages.com/DQmVhuQWCN6Piy4guGS7NFcQL1vbPm9nqNhPYEyNDah8XM8/SecPoint-Shadow-AI-Risk.png) Shadow AI is becoming a growing business risk. In many organisations, employees use public AI tools to save time and increase productivity, but often without understanding the privacy, compliance, and data exposure risks involved. Without clear policies and awareness, sensitive company information can easily be shared with external AI services, creating security, legal, and governance challenges. We have created a practical guide that explains the risks of Shadow AI and how to use public AI in a safer and more controlled way. Read it here: https://www.secpoint.com/risk-shadow-ai-public-ai.html #ShadowAI #CyberSecurity #AIRisk #CyberSecurity #DataSecurity
json metadata{"tags":["shadowai","cybersecurity","airisk","datasecurity"],"image":["https://cdn.steemitimages.com/DQmVhuQWCN6Piy4guGS7NFcQL1vbPm9nqNhPYEyNDah8XM8/SecPoint-Shadow-AI-Risk.png"],"links":["https://www.secpoint.com/risk-shadow-ai-public-ai.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104207074/Trx 1abf17106f41fc3093ed7bbadbd64c4fc37a9f82
View Raw JSON Data
{
  "trx_id": "1abf17106f41fc3093ed7bbadbd64c4fc37a9f82",
  "block": 104207074,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-11T11:56:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "shadowai",
      "author": "secpoint",
      "permlink": "shadow-ai-is-becoming-a-growing-business-risk",
      "title": "Shadow AI is becoming a growing business risk",
      "body": "![SecPoint-Shadow-AI-Risk.png](https://cdn.steemitimages.com/DQmVhuQWCN6Piy4guGS7NFcQL1vbPm9nqNhPYEyNDah8XM8/SecPoint-Shadow-AI-Risk.png)\nShadow AI is becoming a growing business risk.\nIn many organisations, employees use public AI tools to save time and increase productivity, but often without understanding the privacy, compliance, and data exposure risks involved.\n\nWithout clear policies and awareness, sensitive company information can easily be shared with external AI services, creating security, legal, and governance challenges.\n\nWe have created a practical guide that explains the risks of Shadow AI and how to use public AI in a safer and more controlled way.\n\nRead it here: https://www.secpoint.com/risk-shadow-ai-public-ai.html\n\n#ShadowAI #CyberSecurity #AIRisk #CyberSecurity #DataSecurity",
      "json_metadata": "{\"tags\":[\"shadowai\",\"cybersecurity\",\"airisk\",\"datasecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmVhuQWCN6Piy4guGS7NFcQL1vbPm9nqNhPYEyNDah8XM8/SecPoint-Shadow-AI-Risk.png\"],\"links\":[\"https://www.secpoint.com/risk-shadow-ai-public-ai.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/11 11:26:36
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-march-2026-price-list-is-available
titleSecPoint® March 2026 Price List is available
bodySecPoint® March 2026 Price List is available The March 2026 price list for the Protector™ Firewall and Penetrator™ Vulnerability Scanner is available for download. ✔ Simplified Protector™ editions ✔ Cleaner licensing models ✔ Optimized product tiers ✔ Available in USD ($) and EUR (€) Valid from 1 March 2026. Click to log in to the SecPoint® VIP Lounge and download: https://vip.secpoint.com Developed and supported in Europe, serving partners and customers worldwide with transparency, trust, and full control. #SecPoint #CyberSecurity #Protector #Penetrator #EuropeanCybersecurity ![SecPointPriceList2026v2.png](https://cdn.steemitimages.com/DQmTzu9CZyKFDLhHQhy3CSbRcacG4Me3PaSbT2LM2HdrUku/SecPointPriceList2026v2.png)
json metadata{"tags":["secpoint","cybersecurity","protector","penetrator","europeancybersecurity"],"image":["https://cdn.steemitimages.com/DQmTzu9CZyKFDLhHQhy3CSbRcacG4Me3PaSbT2LM2HdrUku/SecPointPriceList2026v2.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104206484/Trx 30aad9f07eaa397e6ec8e7aa15fafa7ff02d80e6
View Raw JSON Data
{
  "trx_id": "30aad9f07eaa397e6ec8e7aa15fafa7ff02d80e6",
  "block": 104206484,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-11T11:26:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-march-2026-price-list-is-available",
      "title": "SecPoint® March 2026 Price List is available",
      "body": "SecPoint® March 2026 Price List is available\n\nThe March 2026 price list for the Protector™ Firewall and Penetrator™ Vulnerability Scanner is available for download.\n\n✔ Simplified Protector™ editions\n✔ Cleaner licensing models\n✔ Optimized product tiers\n✔ Available in USD ($) and EUR (€)\n\nValid from 1 March 2026.\n\nClick to log in to the SecPoint® VIP Lounge and download:\nhttps://vip.secpoint.com\n\nDeveloped and supported in Europe, serving partners and customers worldwide with transparency, trust, and full control.\n\n#SecPoint #CyberSecurity #Protector #Penetrator #EuropeanCybersecurity\n![SecPointPriceList2026v2.png](https://cdn.steemitimages.com/DQmTzu9CZyKFDLhHQhy3CSbRcacG4Me3PaSbT2LM2HdrUku/SecPointPriceList2026v2.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"protector\",\"penetrator\",\"europeancybersecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmTzu9CZyKFDLhHQhy3CSbRcacG4Me3PaSbT2LM2HdrUku/SecPointPriceList2026v2.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/11 11:18:03
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-66-2026-full-release-video
titleSecPoint® Penetrator™ 66 – 2026 Full Release Video
bodyhttps://www.youtube.com/watch?v=ecG776nGGXs SecPoint® Penetrator™ 66 – 2026 Full Release Video The release of SecPoint® Penetrator™ 66 introduces several new features designed to improve visibility, automation, reporting control, and overall vulnerability management efficiency. New Features: • Map of scanned locations available on the home page • Visual overview of the last 20 scanned targets with geographic clustering • Color-coded markers with zoom and drag functionality • Tooltip display showing IP address, scan date, and scan status • One-click access to the Scan Insights page directly from the map • Automated Let’s Encrypt SSL certificate request and installation for the administration interface • Built-in automatic renewal process for trusted SSL certificates • Manual renewal option when required • Continued support for third-party CA certificates and self-signed certificates • Persistent Target Description field within the Insights page • Reuse of previously saved target descriptions via drop-down selection • Improved visibility when scanning large subnets identified only by IP addresses • Option to exclude Informational-level findings from generated reports • Cleaner, shorter, and more executive-focused reporting • System-wide reporting control affecting all users With SecPoint® Penetrator™ 66, vulnerability management becomes more visual, more automated, and more streamlined for modern enterprise environments. Stay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning with intelligent asset context. Download the latest SecPoint® Penetrator™ https://vip.secpoint.com/ Partner sign up: https://www.secpoint.com/partner-signup.html #SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #CyberSec
json metadata{"tags":["secpoint","cybersecurity","vulnerabilityscanning","networksecurity","cybersec"],"image":["https://img.youtube.com/vi/ecG776nGGXs/0.jpg"],"links":["https://www.youtube.com/watch?v=ecG776nGGXs","https://vip.secpoint.com/","https://www.secpoint.com/partner-signup.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104206314/Trx de433fcd1a69a9c1130f88b12aab44cbd1b3ea79
View Raw JSON Data
{
  "trx_id": "de433fcd1a69a9c1130f88b12aab44cbd1b3ea79",
  "block": 104206314,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-11T11:18:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-66-2026-full-release-video",
      "title": "SecPoint® Penetrator™ 66 – 2026 Full Release Video",
      "body": "https://www.youtube.com/watch?v=ecG776nGGXs\nSecPoint® Penetrator™ 66 – 2026 Full Release Video\n\nThe release of SecPoint® Penetrator™ 66 introduces several new features designed to improve visibility, automation, reporting control, and overall vulnerability management efficiency.\n\nNew Features:\n\n• Map of scanned locations available on the home page\n\n• Visual overview of the last 20 scanned targets with geographic clustering\n\n• Color-coded markers with zoom and drag functionality\n\n• Tooltip display showing IP address, scan date, and scan status\n\n• One-click access to the Scan Insights page directly from the map\n\n• Automated Let’s Encrypt SSL certificate request and installation for the administration interface\n\n• Built-in automatic renewal process for trusted SSL certificates\n\n• Manual renewal option when required\n\n• Continued support for third-party CA certificates and self-signed certificates\n\n• Persistent Target Description field within the Insights page\n\n• Reuse of previously saved target descriptions via drop-down selection\n\n• Improved visibility when scanning large subnets identified only by IP addresses\n\n• Option to exclude Informational-level findings from generated reports\n\n• Cleaner, shorter, and more executive-focused reporting\n\n• System-wide reporting control affecting all users\n\nWith SecPoint® Penetrator™ 66, vulnerability management becomes more visual, more automated, and more streamlined for modern enterprise environments.\n\nStay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning with intelligent asset context.\n\nDownload the latest SecPoint® Penetrator™\n\nhttps://vip.secpoint.com/\n\nPartner sign up:\n\nhttps://www.secpoint.com/partner-signup.html\n\n#SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #CyberSec",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"vulnerabilityscanning\",\"networksecurity\",\"cybersec\"],\"image\":[\"https://img.youtube.com/vi/ecG776nGGXs/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=ecG776nGGXs\",\"https://vip.secpoint.com/\",\"https://www.secpoint.com/partner-signup.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
secpointpublished a new post: at-dr-byen
2026/03/10 13:05:33
parent author
parent permlinksecpoint
authorsecpoint
permlinkat-dr-byen
titleat DR Byen
body![secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg](https://cdn.steemitimages.com/DQmRDC6s8tRuBYALqSNeKLCuVYZ4f3Zt7aN5p42MDbKWfoi/secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg](https://cdn.steemitimages.com/DQmfWiEfY2pJBbfAGuAWCsfmyKZJRn8tc2LXa9dAC2hZajB/secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg](https://cdn.steemitimages.com/DQmSqD9mnc2ocWJ3AGkG6T1PXBfHPjDxJ8p5nvht5YnA4qT/secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg](https://cdn.steemitimages.com/DQmNTmHzfc7jpvwBqWiTrhkVkN481tHp3zjij4eFjnr7bng/secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg](https://cdn.steemitimages.com/DQmUMH1jgDtJxbgPvckvMrgk6A658UB8yh71St8Ks77mHpw/secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg](https://cdn.steemitimages.com/DQmQw6AfQuX91BrEUHT887TTqoQQ2pr8mRKMo5eEzBPVB4C/secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg](https://cdn.steemitimages.com/DQmXQLDVZTqjhMMqiR4m1baRCWRESTMepoi9fm8wayPQva5/secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg](https://cdn.steemitimages.com/DQmPLeu8hquKveUZoNN1EUmSQ39Y7uoWY8u45kCMJ2tQi6C/secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg](https://cdn.steemitimages.com/DQmVXWDRnewgYgybfB1KArFzMYKf26w9p3YV3zzzuRB5LAt/secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg](https://cdn.steemitimages.com/DQmQsQ6htU6cMCM7ygmrkURLoWVYqo1M7L71T67p8RW1UcF/secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg)
json metadata{"tags":["secpoint","cybersecurity"],"image":["https://cdn.steemitimages.com/DQmRDC6s8tRuBYALqSNeKLCuVYZ4f3Zt7aN5p42MDbKWfoi/secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg","https://cdn.steemitimages.com/DQmfWiEfY2pJBbfAGuAWCsfmyKZJRn8tc2LXa9dAC2hZajB/secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg","https://cdn.steemitimages.com/DQmSqD9mnc2ocWJ3AGkG6T1PXBfHPjDxJ8p5nvht5YnA4qT/secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg","https://cdn.steemitimages.com/DQmNTmHzfc7jpvwBqWiTrhkVkN481tHp3zjij4eFjnr7bng/secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg","https://cdn.steemitimages.com/DQmUMH1jgDtJxbgPvckvMrgk6A658UB8yh71St8Ks77mHpw/secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg","https://cdn.steemitimages.com/DQmQw6AfQuX91BrEUHT887TTqoQQ2pr8mRKMo5eEzBPVB4C/secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg","https://cdn.steemitimages.com/DQmXQLDVZTqjhMMqiR4m1baRCWRESTMepoi9fm8wayPQva5/secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg","https://cdn.steemitimages.com/DQmPLeu8hquKveUZoNN1EUmSQ39Y7uoWY8u45kCMJ2tQi6C/secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg","https://cdn.steemitimages.com/DQmVXWDRnewgYgybfB1KArFzMYKf26w9p3YV3zzzuRB5LAt/secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg","https://cdn.steemitimages.com/DQmQsQ6htU6cMCM7ygmrkURLoWVYqo1M7L71T67p8RW1UcF/secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104179724/Trx bfee93479e28450bc013513a31566b0df046bd9e
View Raw JSON Data
{
  "trx_id": "bfee93479e28450bc013513a31566b0df046bd9e",
  "block": 104179724,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-10T13:05:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "at-dr-byen",
      "title": "at DR Byen",
      "body": "![secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg](https://cdn.steemitimages.com/DQmRDC6s8tRuBYALqSNeKLCuVYZ4f3Zt7aN5p42MDbKWfoi/secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg](https://cdn.steemitimages.com/DQmfWiEfY2pJBbfAGuAWCsfmyKZJRn8tc2LXa9dAC2hZajB/secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg](https://cdn.steemitimages.com/DQmSqD9mnc2ocWJ3AGkG6T1PXBfHPjDxJ8p5nvht5YnA4qT/secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg](https://cdn.steemitimages.com/DQmNTmHzfc7jpvwBqWiTrhkVkN481tHp3zjij4eFjnr7bng/secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg](https://cdn.steemitimages.com/DQmUMH1jgDtJxbgPvckvMrgk6A658UB8yh71St8Ks77mHpw/secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg](https://cdn.steemitimages.com/DQmQw6AfQuX91BrEUHT887TTqoQQ2pr8mRKMo5eEzBPVB4C/secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg](https://cdn.steemitimages.com/DQmXQLDVZTqjhMMqiR4m1baRCWRESTMepoi9fm8wayPQva5/secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg](https://cdn.steemitimages.com/DQmPLeu8hquKveUZoNN1EUmSQ39Y7uoWY8u45kCMJ2tQi6C/secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg](https://cdn.steemitimages.com/DQmVXWDRnewgYgybfB1KArFzMYKf26w9p3YV3zzzuRB5LAt/secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg](https://cdn.steemitimages.com/DQmQsQ6htU6cMCM7ygmrkURLoWVYqo1M7L71T67p8RW1UcF/secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmRDC6s8tRuBYALqSNeKLCuVYZ4f3Zt7aN5p42MDbKWfoi/secpoint-cyber-security-dagen-denmark-4-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmfWiEfY2pJBbfAGuAWCsfmyKZJRn8tc2LXa9dAC2hZajB/secpoint-cyber-security-dagen-denmark-5-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmSqD9mnc2ocWJ3AGkG6T1PXBfHPjDxJ8p5nvht5YnA4qT/secpoint-cyber-security-dagen-denmark-6-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmNTmHzfc7jpvwBqWiTrhkVkN481tHp3zjij4eFjnr7bng/secpoint-cyber-security-dagen-denmark-7-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmUMH1jgDtJxbgPvckvMrgk6A658UB8yh71St8Ks77mHpw/secpoint-cyber-security-dagen-denmark-8-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmQw6AfQuX91BrEUHT887TTqoQQ2pr8mRKMo5eEzBPVB4C/secpoint-cyber-security-dagen-denmark-9-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmXQLDVZTqjhMMqiR4m1baRCWRESTMepoi9fm8wayPQva5/secpoint-cyber-security-dagen-denmark-10-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmPLeu8hquKveUZoNN1EUmSQ39Y7uoWY8u45kCMJ2tQi6C/secpoint-cyber-security-dagen-denmark-11-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmVXWDRnewgYgybfB1KArFzMYKf26w9p3YV3zzzuRB5LAt/secpoint-cyber-security-dagen-denmark-12-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmQsQ6htU6cMCM7ygmrkURLoWVYqo1M7L71T67p8RW1UcF/secpoint-cyber-security-dagen-denmark-13-march-2026.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/06 18:26:18
votermrosenquist
authorsecpoint
permlinksecpoint-r-protector-and-penetrator-march-2026-software-releases-available
weight10000 (100.00%)
Transaction InfoBlock #104071182/Trx 337d15841c8915f2b33f92fb9939021fa3a97e7a
View Raw JSON Data
{
  "trx_id": "337d15841c8915f2b33f92fb9939021fa3a97e7a",
  "block": 104071182,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-06T18:26:18",
  "op": [
    "vote",
    {
      "voter": "mrosenquist",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-and-penetrator-march-2026-software-releases-available",
      "weight": 10000
    }
  ]
}
2026/03/06 12:17:54
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-and-penetrator-march-2026-software-releases-available
titleSecPoint® Protector & Penetrator – March 2026 Software Releases Available
bodySecPoint® Protector & Penetrator – March 2026 Software Releases Available The March 2026 software releases of SecPoint Protector and SecPoint Penetrator are now available for download in the SecPoint VIP Lounge. Built on the latest firmware versions, these new releases continue to improve security, usability, performance, and platform stability for both customers and partners. Highlights of the March 2026 releases: • SecPoint Penetrator – based on firmware v67, including smart Lethalattack improvements, new XLS report export, and new CRA and CWE compliance profiles • SecPoint Protector – based on the latest firmware v68, with continued focus on security hardening, monitoring improvements, and IPS refinements • Additional platform improvements help deliver a stronger and more efficient experience for daily security operations Available image formats: • Virtual Images, including Proxmox • Raw Linux Images Access the latest releases via the SecPoint VIP Lounge: https://vip.secpoint.com #secpoint #penetrator #protector #cybersecurity #networksecurity ![secpoint-software-march-2026-.png](https://cdn.steemitimages.com/DQmZfynhN7Qwu7TQBZc1AUYx4473STuu5ReB9Q3DNNw17Ms/secpoint-software-march-2026-.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","protector","networksecurity"],"image":["https://cdn.steemitimages.com/DQmZfynhN7Qwu7TQBZc1AUYx4473STuu5ReB9Q3DNNw17Ms/secpoint-software-march-2026-.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104063828/Trx ca121faa98859fea79dd3a641f740d47bfb97352
View Raw JSON Data
{
  "trx_id": "ca121faa98859fea79dd3a641f740d47bfb97352",
  "block": 104063828,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-06T12:17:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-and-penetrator-march-2026-software-releases-available",
      "title": "SecPoint® Protector & Penetrator – March 2026 Software Releases Available",
      "body": "SecPoint® Protector & Penetrator – March 2026 Software Releases Available\n\nThe March 2026 software releases of SecPoint Protector and SecPoint Penetrator are now available for download in the SecPoint VIP Lounge.\n\nBuilt on the latest firmware versions, these new releases continue to improve security, usability, performance, and platform stability for both customers and partners.\n\nHighlights of the March 2026 releases:\n\n• SecPoint Penetrator – based on firmware v67, including smart Lethalattack improvements, new XLS report export, and new CRA and CWE compliance profiles\n• SecPoint Protector – based on the latest firmware v68, with continued focus on security hardening, monitoring improvements, and IPS refinements\n• Additional platform improvements help deliver a stronger and more efficient experience for daily security operations\n\nAvailable image formats:\n• Virtual Images, including Proxmox\n• Raw Linux Images\n\nAccess the latest releases via the SecPoint VIP Lounge:\nhttps://vip.secpoint.com\n\n#secpoint #penetrator #protector #cybersecurity #networksecurity\n![secpoint-software-march-2026-.png](https://cdn.steemitimages.com/DQmZfynhN7Qwu7TQBZc1AUYx4473STuu5ReB9Q3DNNw17Ms/secpoint-software-march-2026-.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"protector\",\"networksecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmZfynhN7Qwu7TQBZc1AUYx4473STuu5ReB9Q3DNNw17Ms/secpoint-software-march-2026-.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/03/04 21:37:33
parent author
parent permlinksecpoint
authorsecpoint
permlinkarrived-at-cyber-security-dagen-2026-excited-to-be-at-cyber-security-dagen-2026-at-dr-koncerthuset-in-copenhagen
title🇩🇰 Arrived at Cyber Security Dagen 2026 Excited to be at Cyber Security Dagen 2026 at DR Koncerthuset in Copenhagen.
body🇩🇰 Arrived at Cyber Security Dagen 2026 Excited to be at Cyber Security Dagen 2026 at DR Koncerthuset in Copenhagen. Today more than 2,000 decision-makers, executives, cybersecurity specialists and leaders from critical infrastructure gather to discuss Denmark’s digital robustness in an increasingly complex hybrid threat landscape. Looking forward to insights from: • Lars Løkke Rasmussen on Denmark’s digital resilience • Jacob Kaarsbo on hybrid threats and intelligence • Senior leaders from Nuuday, DR, Nationalbanken and DI • Experts addressing AI, geopolitics and the evolving threat landscape The agenda reflects a reality we all feel: We are more connected than ever. And therefore more exposed. Strong leadership, strategic clarity and practical security implementation have never been more important. Looking forward to discussions, concrete cases and valuable conversations across Denmark’s cybersecurity ecosystem. @TDC Erhverv @Dansk Industri @IT-Branchen @DR @dr-koncerthuset #CyberSecurityDagen #Cybersecurity #DigitalResilience #Denmark #SecPoint ![secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg](https://cdn.steemitimages.com/DQmTSuETh8EEspYiZW8utJ25DUb9rmke22LeTedUzKYDhzb/secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg](https://cdn.steemitimages.com/DQmf1vJeZ1FWPRK2sb8b7PArU9DcRNkigb62F48KJWGcCH4/secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg) ![secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg](https://cdn.steemitimages.com/DQmYJFTxRvk4EdfdKxHiwL6rmfahgtGvZXijHijN1WsfN2H/secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg)
json metadata{"tags":["secpoint","cybersecurity","cybersecuritydagen","digitalresilience","denmark"],"users":["tdc","dansk","it-branchen","dr-koncerthuset"],"image":["https://cdn.steemitimages.com/DQmTSuETh8EEspYiZW8utJ25DUb9rmke22LeTedUzKYDhzb/secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg","https://cdn.steemitimages.com/DQmf1vJeZ1FWPRK2sb8b7PArU9DcRNkigb62F48KJWGcCH4/secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg","https://cdn.steemitimages.com/DQmYJFTxRvk4EdfdKxHiwL6rmfahgtGvZXijHijN1WsfN2H/secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #104017524/Trx 48ea6986019feb9c7aaedfcce6dfd93608a9b684
View Raw JSON Data
{
  "trx_id": "48ea6986019feb9c7aaedfcce6dfd93608a9b684",
  "block": 104017524,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-03-04T21:37:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "arrived-at-cyber-security-dagen-2026-excited-to-be-at-cyber-security-dagen-2026-at-dr-koncerthuset-in-copenhagen",
      "title": "🇩🇰 Arrived at Cyber Security Dagen 2026  Excited to be at Cyber Security Dagen 2026 at DR Koncerthuset in Copenhagen.",
      "body": "🇩🇰 Arrived at Cyber Security Dagen 2026\n\nExcited to be at Cyber Security Dagen 2026 at DR Koncerthuset in Copenhagen.\n\nToday more than 2,000 decision-makers, executives, cybersecurity specialists and leaders from critical infrastructure gather to discuss Denmark’s digital robustness in an increasingly complex hybrid threat landscape.\n\nLooking forward to insights from:\n\n• Lars Løkke Rasmussen on Denmark’s digital resilience\n• Jacob Kaarsbo on hybrid threats and intelligence\n• Senior leaders from Nuuday, DR, Nationalbanken and DI\n• Experts addressing AI, geopolitics and the evolving threat landscape\n\nThe agenda reflects a reality we all feel:\n\nWe are more connected than ever.\nAnd therefore more exposed.\n\nStrong leadership, strategic clarity and practical security implementation have never been more important.\n\nLooking forward to discussions, concrete cases and valuable conversations across Denmark’s cybersecurity ecosystem.\n@TDC Erhverv\n@Dansk Industri\n@IT-Branchen\n@DR  @dr-koncerthuset\n#CyberSecurityDagen #Cybersecurity #DigitalResilience #Denmark #SecPoint\n![secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg](https://cdn.steemitimages.com/DQmTSuETh8EEspYiZW8utJ25DUb9rmke22LeTedUzKYDhzb/secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg](https://cdn.steemitimages.com/DQmf1vJeZ1FWPRK2sb8b7PArU9DcRNkigb62F48KJWGcCH4/secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg)\n\n![secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg](https://cdn.steemitimages.com/DQmYJFTxRvk4EdfdKxHiwL6rmfahgtGvZXijHijN1WsfN2H/secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersecuritydagen\",\"digitalresilience\",\"denmark\"],\"users\":[\"tdc\",\"dansk\",\"it-branchen\",\"dr-koncerthuset\"],\"image\":[\"https://cdn.steemitimages.com/DQmTSuETh8EEspYiZW8utJ25DUb9rmke22LeTedUzKYDhzb/secpoint-cyber-security-dagen-denmark-1-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmf1vJeZ1FWPRK2sb8b7PArU9DcRNkigb62F48KJWGcCH4/secpoint-cyber-security-dagen-denmark-3-march-2026.jpeg\",\"https://cdn.steemitimages.com/DQmYJFTxRvk4EdfdKxHiwL6rmfahgtGvZXijHijN1WsfN2H/secpoint-cyber-security-dagen-denmark-2-march-2026.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/24 14:48:30
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-v66-manage-information-checks-in-reports
titleSecPoint® Penetrator™ v66 – Manage Information Checks in Reports
bodySecPoint® Penetrator™ v66 – Manage Information Checks in Reports The latest SecPoint® Penetrator™ v66 release introduces new report customization capabilities, allowing security teams to include or remove Information Checks directly in scan reports. This provides greater flexibility when tailoring reports for customers, compliance, or executive management. Customizable sections include: • Operating System detection • Ports and Services • Version Banners • Traceroute data • Target location mapping • Gap analysis • Informational vulnerabilities Additional options such as language selection, company branding, logos, and confidentiality watermarks ensure fully professional and audience-specific reporting. Benefits: • Tailored customer reports • Reduced report noise • Improved compliance documentation • Greater control of shared intelligence Stay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning with powerful reporting flexibility. Learn more: https://www.secpoint.com/contact-us.html Partner sign up: https://www.secpoint.com/partner-signup.html #SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #CyberSec
json metadata{"tags":["secpoint","cybersecurity","vulnerabilityscanning","networksecurity","cybersec"],"links":["https://www.secpoint.com/contact-us.html","https://www.secpoint.com/partner-signup.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103779721/Trx 1b576602161f8c5a6676054aa094f88be7a8573f
View Raw JSON Data
{
  "trx_id": "1b576602161f8c5a6676054aa094f88be7a8573f",
  "block": 103779721,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-24T14:48:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v66-manage-information-checks-in-reports",
      "title": "SecPoint® Penetrator™ v66 – Manage Information Checks in Reports",
      "body": "SecPoint® Penetrator™ v66 – Manage Information Checks in Reports\n\nThe latest SecPoint® Penetrator™ v66 release introduces new report customization capabilities, allowing security teams to include or remove Information Checks directly in scan reports.\n\nThis provides greater flexibility when tailoring reports for customers, compliance, or executive management.\n\nCustomizable sections include:\n\n• Operating System detection\n• Ports and Services\n• Version Banners\n• Traceroute data\n• Target location mapping\n• Gap analysis\n• Informational vulnerabilities\n\nAdditional options such as language selection, company branding, logos, and confidentiality watermarks ensure fully professional and audience-specific reporting.\n\nBenefits:\n\n• Tailored customer reports\n• Reduced report noise\n• Improved compliance documentation\n• Greater control of shared intelligence\n\nStay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning with powerful reporting flexibility.\n\nLearn more:\nhttps://www.secpoint.com/contact-us.html\n\nPartner sign up:\nhttps://www.secpoint.com/partner-signup.html\n\n#SecPoint #CyberSecurity #VulnerabilityScanning #NetworkSecurity #CyberSec",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"vulnerabilityscanning\",\"networksecurity\",\"cybersec\"],\"links\":[\"https://www.secpoint.com/contact-us.html\",\"https://www.secpoint.com/partner-signup.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/23 12:49:24
voterakdx
authorsecpoint
permlinksecpoint-has-renewed-the-cybersecurity-made-in-europe-label-for-2026
weight6500 (65.00%)
Transaction InfoBlock #103748659/Trx 5296f21a83220464cc8a966190c07f5584827fab
View Raw JSON Data
{
  "trx_id": "5296f21a83220464cc8a966190c07f5584827fab",
  "block": 103748659,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-23T12:49:24",
  "op": [
    "vote",
    {
      "voter": "akdx",
      "author": "secpoint",
      "permlink": "secpoint-has-renewed-the-cybersecurity-made-in-europe-label-for-2026",
      "weight": 6500
    }
  ]
}
2026/02/23 12:41:18
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-has-renewed-the-cybersecurity-made-in-europe-label-for-2026
titleSecPoint has renewed the “Cybersecurity Made in Europe” label for 2026
bodySecPoint has renewed the “Cybersecurity Made in Europe” label for 2026. We are proud to announce that SecPoint has successfully renewed the ECSO “Cybersecurity Made in Europe” label, once again recognizing our commitment to developing trusted, sovereign European cybersecurity technologies. The renewal has been facilitated via CenSec, further strengthening our position within the European cybersecurity ecosystem. This recognition underlines our continued focus on innovation, transparency, and high-quality security solutions designed and developed in Europe. At SecPoint, we remain dedicated to delivering advanced cybersecurity technologies, including: • SecPoint Penetrator – Advanced vulnerability scanning and penetration testing • SecPoint Protector – A powerful UTM firewall for blocking cyber threats and attacks • Dark Web Search and MSP Security Solutions – Helping organizations stay ahead of evolving threats With the renewed label for 2026, we continue to support European cybersecurity innovation while delivering strong digital defense solutions to businesses and institutions worldwide. Read more about SecPoint products here: https://www.secpoint.com https://www.cybersecurity-label.eu/labelled-companies/ #ECSO #CyberSecurityMadeInEurope #SecPoint #CyberSecurity #CyberSec #VulnerabilityScanning ![SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg](https://cdn.steemitimages.com/DQmNwKF5RtVQoUUdDMzjkFLtg7pdsGUFiSxDs1GKvj3fDNx/SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg)
json metadata{"tags":["secpoint","cybersecurity","ecso","cybersecuritymadeineurope","cybersec","vulnerabilityscanning"],"image":["https://cdn.steemitimages.com/DQmNwKF5RtVQoUUdDMzjkFLtg7pdsGUFiSxDs1GKvj3fDNx/SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg"],"links":["https://www.secpoint.com","https://www.cybersecurity-label.eu/labelled-companies/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103748498/Trx ecf14f64b6be9ca0eb60c489a98d9b4fa2283719
View Raw JSON Data
{
  "trx_id": "ecf14f64b6be9ca0eb60c489a98d9b4fa2283719",
  "block": 103748498,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-23T12:41:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-has-renewed-the-cybersecurity-made-in-europe-label-for-2026",
      "title": "SecPoint has renewed the “Cybersecurity Made in Europe” label for 2026",
      "body": "SecPoint has renewed the “Cybersecurity Made in Europe” label for 2026.\n\nWe are proud to announce that SecPoint has successfully renewed the ECSO “Cybersecurity Made in Europe” label, once again recognizing our commitment to developing trusted, sovereign European cybersecurity technologies. The renewal has been facilitated via CenSec, further strengthening our position within the European cybersecurity ecosystem.\n\nThis recognition underlines our continued focus on innovation, transparency, and high-quality security solutions designed and developed in Europe.\n\nAt SecPoint, we remain dedicated to delivering advanced cybersecurity technologies, including:\n\n• SecPoint Penetrator – Advanced vulnerability scanning and penetration testing\n• SecPoint Protector – A powerful UTM firewall for blocking cyber threats and attacks\n• Dark Web Search and MSP Security Solutions – Helping organizations stay ahead of evolving threats\n\nWith the renewed label for 2026, we continue to support European cybersecurity innovation while delivering strong digital defense solutions to businesses and institutions worldwide.\n\nRead more about SecPoint products here: https://www.secpoint.com\nhttps://www.cybersecurity-label.eu/labelled-companies/\n\n#ECSO #CyberSecurityMadeInEurope #SecPoint #CyberSecurity #CyberSec #VulnerabilityScanning\n\n![SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg](https://cdn.steemitimages.com/DQmNwKF5RtVQoUUdDMzjkFLtg7pdsGUFiSxDs1GKvj3fDNx/SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"ecso\",\"cybersecuritymadeineurope\",\"cybersec\",\"vulnerabilityscanning\"],\"image\":[\"https://cdn.steemitimages.com/DQmNwKF5RtVQoUUdDMzjkFLtg7pdsGUFiSxDs1GKvj3fDNx/SecPoint-CyberSecurityEu2026-ECSO-Censec.jpeg\"],\"links\":[\"https://www.secpoint.com\",\"https://www.cybersecurity-label.eu/labelled-companies/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/19 14:38:51
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-new-target-world-map-visualization
titleSecPoint® Penetrator™ – New Target World Map Visualization
bodyhttps://www.youtube.com/watch?v=x3G_XszX0ec The latest SecPoint® Penetrator™ release introduces an advanced visual feature - the Target Map, providing a global overview of scanned assets directly on an interactive world map. This new functionality allows security teams to instantly visualize where scanned targets are located geographically, delivering stronger operational insight across distributed infrastructures, subsidiaries, and remote offices. Key Highlight: Global Target Visualization Each scanned asset is plotted on a dynamic world map, transforming vulnerability scanning data into a clear and intuitive visual overview. This makes it easier to validate scan scope, document global testing coverage, and present security posture to both technical teams and executive management. Benefits: • Visual overview of scanned targets worldwide • Improved global asset visibility • Easier reporting and stakeholder presentations • Clear validation of scan coverage • Modern, user-friendly interface enhancement Stay secure with SecPoint® Penetrator™ - enterprise-grade vulnerability scanning designed for complete visibility across your global network infrastructure. Learn more about the SecPoint® Penetrator Vulnerability Scanner: https://www.secpoint.com/penetrator.html Partner sign up: https://www.secpoint.com/partner-signup.html #SecPoint #CyberSecurity #VulnerabilityScanning #AttackSurface #NetworkSecurity
json metadata{"tags":["secpoint","cybersecurity","vulnerabilityscanning","attacksurface","networksecurity"],"image":["https://img.youtube.com/vi/x3G_XszX0ec/0.jpg"],"links":["https://www.youtube.com/watch?v=x3G_XszX0ec","https://www.secpoint.com/penetrator.html","https://www.secpoint.com/partner-signup.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103635876/Trx 4ef28b2b0ea246ea4a8d87d0d039fe08c3c1689a
View Raw JSON Data
{
  "trx_id": "4ef28b2b0ea246ea4a8d87d0d039fe08c3c1689a",
  "block": 103635876,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-19T14:38:51",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-new-target-world-map-visualization",
      "title": "SecPoint® Penetrator™ – New Target World Map Visualization",
      "body": "https://www.youtube.com/watch?v=x3G_XszX0ec\n\nThe latest SecPoint® Penetrator™ release introduces an advanced visual feature - the Target Map, providing a global overview of scanned assets directly on an interactive world map.\n\nThis new functionality allows security teams to instantly visualize where scanned targets are located geographically, delivering stronger operational insight across distributed infrastructures, subsidiaries, and remote offices.\n\nKey Highlight:\n\nGlobal Target Visualization\n\nEach scanned asset is plotted on a dynamic world map, transforming vulnerability scanning data into a clear and intuitive visual overview. \nThis makes it easier to validate scan scope, document global testing coverage, and present security posture to both technical teams and executive management.\n\nBenefits:\n\n• Visual overview of scanned targets worldwide\n• Improved global asset visibility\n• Easier reporting and stakeholder presentations\n• Clear validation of scan coverage\n• Modern, user-friendly interface enhancement\n\nStay secure with SecPoint® Penetrator™ - enterprise-grade vulnerability scanning designed for complete visibility across your global network infrastructure.\n\nLearn more about the SecPoint® Penetrator Vulnerability Scanner:\nhttps://www.secpoint.com/penetrator.html\n\nPartner sign up:\nhttps://www.secpoint.com/partner-signup.html\n\n#SecPoint #CyberSecurity #VulnerabilityScanning #AttackSurface #NetworkSecurity",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"vulnerabilityscanning\",\"attacksurface\",\"networksecurity\"],\"image\":[\"https://img.youtube.com/vi/x3G_XszX0ec/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=x3G_XszX0ec\",\"https://www.secpoint.com/penetrator.html\",\"https://www.secpoint.com/partner-signup.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/13 19:55:06
votermrosenquist
authorsecpoint
permlinkday-1-recap-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen
weight2100 (21.00%)
Transaction InfoBlock #103469873/Trx b639ca1bb2c0a630ea817f1addcc77154ad2b3f5
View Raw JSON Data
{
  "trx_id": "b639ca1bb2c0a630ea817f1addcc77154ad2b3f5",
  "block": 103469873,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-13T19:55:06",
  "op": [
    "vote",
    {
      "voter": "mrosenquist",
      "author": "secpoint",
      "permlink": "day-1-recap-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen",
      "weight": 2100
    }
  ]
}
2026/02/13 14:27:51
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-visiting-c-base-hackerspace-in-berlin-during-a-recent-visit-to-berlin
title📍🇩🇪 SecPoint Visiting c-base Hackerspace in Berlin During a recent visit to Berlin
body📍🇩🇪 SecPoint Visiting c-base Hackerspace in Berlin During a recent visit to Berlin, we had the opportunity to stop by the well-known c-base hackerspace, a historic hub for hackers, technologists, and cybersecurity enthusiasts. Known for its unique “crashed space station beneath Berlin” lore, c-base blends hacker culture with a futuristic, sci-fi inspired environment that reflects creativity and technological exploration. It was inspiring to experience an environment dedicated to innovation, ethical hacking, and knowledge sharing within the global security community. #SecPoint #cbase #CyberSecurity #Hackerspace #Berlin ![secpoint-cbase-1.jpeg](https://cdn.steemitimages.com/DQmUVjqDuuYrvVAQZmwXubA4i2tWhGfhp9v1iqRCqDJJ2me/secpoint-cbase-1.jpeg) ![secpoint-cbase-2.jpeg](https://cdn.steemitimages.com/DQmSgouD3cHXD3LnpMZQwAShpRzpx1LyR3pLPLrG4mMJzxV/secpoint-cbase-2.jpeg) ![secpoint-cbase-3.jpeg](https://cdn.steemitimages.com/DQmWUV4Gq6yJ5MC79FxKkZmRE1MWe1ZPiM3ZAMSNTN7M2vP/secpoint-cbase-3.jpeg) ![secpoint-cbase-4.jpeg](https://cdn.steemitimages.com/DQmSiV12Zq9MuzGQbvZ7nyyZxN2qtjB3x9LatN72fAZBLTb/secpoint-cbase-4.jpeg) ![secpoint-cbase-5.jpeg](https://cdn.steemitimages.com/DQmQyDGNxqdqnkLGTAdMazrEkpc7cN71GuWyQUFQLXJEb4f/secpoint-cbase-5.jpeg) ![secpoint-cbase-6.jpeg](https://cdn.steemitimages.com/DQmRj63Erg2m8Qpas3Tz7sugBc6tvuCvwdfW3JPeyzqzVcz/secpoint-cbase-6.jpeg)
json metadata{"tags":["secpoint","berlin","hackerspace","cbase","cybersecurity"],"image":["https://cdn.steemitimages.com/DQmUVjqDuuYrvVAQZmwXubA4i2tWhGfhp9v1iqRCqDJJ2me/secpoint-cbase-1.jpeg","https://cdn.steemitimages.com/DQmSgouD3cHXD3LnpMZQwAShpRzpx1LyR3pLPLrG4mMJzxV/secpoint-cbase-2.jpeg","https://cdn.steemitimages.com/DQmWUV4Gq6yJ5MC79FxKkZmRE1MWe1ZPiM3ZAMSNTN7M2vP/secpoint-cbase-3.jpeg","https://cdn.steemitimages.com/DQmSiV12Zq9MuzGQbvZ7nyyZxN2qtjB3x9LatN72fAZBLTb/secpoint-cbase-4.jpeg","https://cdn.steemitimages.com/DQmQyDGNxqdqnkLGTAdMazrEkpc7cN71GuWyQUFQLXJEb4f/secpoint-cbase-5.jpeg","https://cdn.steemitimages.com/DQmRj63Erg2m8Qpas3Tz7sugBc6tvuCvwdfW3JPeyzqzVcz/secpoint-cbase-6.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103463340/Trx c76483cd72e15ed63937af46d7495699ee23614c
View Raw JSON Data
{
  "trx_id": "c76483cd72e15ed63937af46d7495699ee23614c",
  "block": 103463340,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-13T14:27:51",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-visiting-c-base-hackerspace-in-berlin-during-a-recent-visit-to-berlin",
      "title": "📍🇩🇪 SecPoint Visiting c-base Hackerspace in Berlin  During a recent visit to Berlin",
      "body": "📍🇩🇪 SecPoint Visiting c-base Hackerspace in Berlin\n\nDuring a recent visit to Berlin, we had the opportunity to stop by the well-known c-base hackerspace, a historic hub for hackers, technologists, and cybersecurity enthusiasts.\n\nKnown for its unique “crashed space station beneath Berlin” lore, c-base blends hacker culture with a futuristic, sci-fi inspired environment that reflects creativity and technological exploration.\n\nIt was inspiring to experience an environment dedicated to innovation, ethical hacking, and knowledge sharing within the global security community.\n\n#SecPoint #cbase #CyberSecurity #Hackerspace #Berlin\n![secpoint-cbase-1.jpeg](https://cdn.steemitimages.com/DQmUVjqDuuYrvVAQZmwXubA4i2tWhGfhp9v1iqRCqDJJ2me/secpoint-cbase-1.jpeg)\n\n![secpoint-cbase-2.jpeg](https://cdn.steemitimages.com/DQmSgouD3cHXD3LnpMZQwAShpRzpx1LyR3pLPLrG4mMJzxV/secpoint-cbase-2.jpeg)\n\n![secpoint-cbase-3.jpeg](https://cdn.steemitimages.com/DQmWUV4Gq6yJ5MC79FxKkZmRE1MWe1ZPiM3ZAMSNTN7M2vP/secpoint-cbase-3.jpeg)\n\n![secpoint-cbase-4.jpeg](https://cdn.steemitimages.com/DQmSiV12Zq9MuzGQbvZ7nyyZxN2qtjB3x9LatN72fAZBLTb/secpoint-cbase-4.jpeg)\n\n![secpoint-cbase-5.jpeg](https://cdn.steemitimages.com/DQmQyDGNxqdqnkLGTAdMazrEkpc7cN71GuWyQUFQLXJEb4f/secpoint-cbase-5.jpeg)\n\n![secpoint-cbase-6.jpeg](https://cdn.steemitimages.com/DQmRj63Erg2m8Qpas3Tz7sugBc6tvuCvwdfW3JPeyzqzVcz/secpoint-cbase-6.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"berlin\",\"hackerspace\",\"cbase\",\"cybersecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmUVjqDuuYrvVAQZmwXubA4i2tWhGfhp9v1iqRCqDJJ2me/secpoint-cbase-1.jpeg\",\"https://cdn.steemitimages.com/DQmSgouD3cHXD3LnpMZQwAShpRzpx1LyR3pLPLrG4mMJzxV/secpoint-cbase-2.jpeg\",\"https://cdn.steemitimages.com/DQmWUV4Gq6yJ5MC79FxKkZmRE1MWe1ZPiM3ZAMSNTN7M2vP/secpoint-cbase-3.jpeg\",\"https://cdn.steemitimages.com/DQmSiV12Zq9MuzGQbvZ7nyyZxN2qtjB3x9LatN72fAZBLTb/secpoint-cbase-4.jpeg\",\"https://cdn.steemitimages.com/DQmQyDGNxqdqnkLGTAdMazrEkpc7cN71GuWyQUFQLXJEb4f/secpoint-cbase-5.jpeg\",\"https://cdn.steemitimages.com/DQmRj63Erg2m8Qpas3Tz7sugBc6tvuCvwdfW3JPeyzqzVcz/secpoint-cbase-6.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/13 08:11:33
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-tm-v66-now-supporting-let-s-encrypt-integration
titleSecPoint® Penetrator™ v66 – Now Supporting Let’s Encrypt Integration
bodyhttps://www.youtube.com/watch?v=x-5BK3lgN50 SecPoint® Penetrator™ v66 – Now Supporting Let’s Encrypt Integration The latest SecPoint® Penetrator™ v66 release introduces native support for Let’s Encrypt, making it easier than ever to deploy trusted SSL/TLS certificates for secure vulnerability scanning and authenticated testing environments. Key Highlight in v66: Let’s Encrypt Certificate Support Penetrator™ v66 can now integrate with Let’s Encrypt to automatically deploy trusted certificates, ensuring encrypted communication and eliminating browser trust warnings during scans and web interface access. This allows organizations to maintain secure, compliant, and fully trusted testing infrastructures without the need for manual certificate management. Benefits: • Trusted SSL/TLS encryption for scan interfaces • Improved compliance and security posture • No self-signed certificate warnings • Simplified certificate lifecycle management • Automated trust deployment Stay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning designed for modern encrypted environments. Learn more about the SecPoint® Penetrator Vulnerability Scanner: https://www.secpoint.com/penetrator.html Partner sign up: https://www.secpoint.com/partner-signup.html #SecPoint #CyberSecurity #Penetrator #VulnerabilityScanning #LetsEncrypt
json metadata{"tags":["secpoint","cybersecurity","letsencrypt","penetrator","vulnerabilityscanning"],"image":["https://img.youtube.com/vi/x-5BK3lgN50/0.jpg"],"links":["https://www.youtube.com/watch?v=x-5BK3lgN50","https://www.secpoint.com/penetrator.html","https://www.secpoint.com/partner-signup.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103455831/Trx 9aeaf7cdb9c86c7dc38002f1bb5f12cb504b7330
View Raw JSON Data
{
  "trx_id": "9aeaf7cdb9c86c7dc38002f1bb5f12cb504b7330",
  "block": 103455831,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-13T08:11:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-tm-v66-now-supporting-let-s-encrypt-integration",
      "title": "SecPoint® Penetrator™ v66 – Now Supporting Let’s Encrypt Integration",
      "body": "https://www.youtube.com/watch?v=x-5BK3lgN50\n\nSecPoint® Penetrator™ v66 – Now Supporting Let’s Encrypt Integration\n\nThe latest SecPoint® Penetrator™ v66 release introduces native support for Let’s Encrypt, making it easier than ever to deploy trusted SSL/TLS certificates for secure vulnerability scanning and authenticated testing environments.\n\nKey Highlight in v66:\n\nLet’s Encrypt Certificate Support\nPenetrator™ v66 can now integrate with Let’s Encrypt to automatically deploy trusted certificates, ensuring encrypted communication and eliminating browser trust warnings during scans and web interface access.\n\nThis allows organizations to maintain secure, compliant, and fully trusted testing infrastructures without the need for manual certificate management.\n\nBenefits:\n\n• Trusted SSL/TLS encryption for scan interfaces\n• Improved compliance and security posture\n• No self-signed certificate warnings\n• Simplified certificate lifecycle management\n• Automated trust deployment\n\nStay secure with SecPoint® Penetrator™ – enterprise-grade vulnerability scanning designed for modern encrypted environments.\n\nLearn more about the SecPoint® Penetrator Vulnerability Scanner:\nhttps://www.secpoint.com/penetrator.html\n\nPartner sign up:\nhttps://www.secpoint.com/partner-signup.html\n\n#SecPoint #CyberSecurity #Penetrator #VulnerabilityScanning #LetsEncrypt",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"letsencrypt\",\"penetrator\",\"vulnerabilityscanning\"],\"image\":[\"https://img.youtube.com/vi/x-5BK3lgN50/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=x-5BK3lgN50\",\"https://www.secpoint.com/penetrator.html\",\"https://www.secpoint.com/partner-signup.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/10 16:36:27
parent author
parent permlinksecpoint
authorsecpoint
permlinkday-2-recap-and-closing-highlights-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen
titleDay 2 recap and closing highlights from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen
bodyDay 2 recap and closing highlights from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen. The second day continued with strong momentum for SecPoint on the exhibition floor, with highly relevant dialogues, new connections, and deeper discussions around cyber resilience within defence, government, and critical infrastructure sectors. We had the opportunity to present the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall to a wide range of defence stakeholders, focusing on proactive vulnerability management, toxic IP blocking, and real-world threat detection in hybrid warfare environments. It was great to reconnect with partners, meet new organisations, and exchange perspectives on how cyber defence capabilities must evolve alongside geopolitical developments and modern attack surfaces. We are sharing a few photo highlights from Day 2 here, capturing some of the many valuable interactions and moments from the conference floor. A sincere thank you to the organisers for delivering a very well-executed event with strong participation, great networking opportunities, and a highly relevant defence agenda. Thank you to: DI Forsvar og Sikkerhed CenSec – Center for Defence, Space & Security Naval Team Denmark Forsvarsministeriets Materiel- og Indkøbsstyrelse Forsvarets Industrikontor Bella Center Copenhagen We appreciate the many great conversations and look forward to continuing the dialogue after the conference. #SecPoint #DDAC2026 #CyberSecurity #Defense #NATO ![secpoint-ddac2026-day2-5.jpg](https://cdn.steemitimages.com/DQmYzmWxGYFjCjYKLq2m7gZnKK1xbuVfXZgtzSQgeRZa8pW/secpoint-ddac2026-day2-5.jpg) ![secpoint-ddac2026-day2-4.jpeg](https://cdn.steemitimages.com/DQmafyTf4Saz8PMvq1frMnJCCuxUDkCiv6u1sYThTtxRrkg/secpoint-ddac2026-day2-4.jpeg) ![secpoint-ddac2026-day2-3.jpeg](https://cdn.steemitimages.com/DQmbPWXJCrbS2jq5WKbKj2atnzyNiaM83rqgXHGFpqfr29v/secpoint-ddac2026-day2-3.jpeg) ![secpoint-ddac2026-day2-2.jpeg](https://cdn.steemitimages.com/DQmZ9G1tAN8PjbfPdcE9ehbkShH4Lxcaf3KSPiQkF7xJCxB/secpoint-ddac2026-day2-2.jpeg) ![secpoint-ddac2026-day2-1.jpeg](https://cdn.steemitimages.com/DQmXXCNyoP38ZCDMrPBzGbKkkUNrwmVjzp76bvxwoB3pysV/secpoint-ddac2026-day2-1.jpeg)
json metadata{"tags":["secpoint","cybersec","cybersecurity","ddac2026","defense","nato"],"image":["https://cdn.steemitimages.com/DQmYzmWxGYFjCjYKLq2m7gZnKK1xbuVfXZgtzSQgeRZa8pW/secpoint-ddac2026-day2-5.jpg","https://cdn.steemitimages.com/DQmafyTf4Saz8PMvq1frMnJCCuxUDkCiv6u1sYThTtxRrkg/secpoint-ddac2026-day2-4.jpeg","https://cdn.steemitimages.com/DQmbPWXJCrbS2jq5WKbKj2atnzyNiaM83rqgXHGFpqfr29v/secpoint-ddac2026-day2-3.jpeg","https://cdn.steemitimages.com/DQmZ9G1tAN8PjbfPdcE9ehbkShH4Lxcaf3KSPiQkF7xJCxB/secpoint-ddac2026-day2-2.jpeg","https://cdn.steemitimages.com/DQmXXCNyoP38ZCDMrPBzGbKkkUNrwmVjzp76bvxwoB3pysV/secpoint-ddac2026-day2-1.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103379679/Trx e2129d777ebca69b3fc2a721906dcc5a7d2dc00f
View Raw JSON Data
{
  "trx_id": "e2129d777ebca69b3fc2a721906dcc5a7d2dc00f",
  "block": 103379679,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-10T16:36:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "day-2-recap-and-closing-highlights-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen",
      "title": "Day 2 recap and closing highlights from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen",
      "body": "Day 2 recap and closing highlights from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen.\n\nThe second day continued with strong momentum for SecPoint on the exhibition floor, with highly relevant dialogues, new connections, and deeper discussions around cyber resilience within defence, government, and critical infrastructure sectors.\n\nWe had the opportunity to present the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall to a wide range of defence stakeholders, focusing on proactive vulnerability management, toxic IP blocking, and real-world threat detection in hybrid warfare environments.\n\nIt was great to reconnect with partners, meet new organisations, and exchange perspectives on how cyber defence capabilities must evolve alongside geopolitical developments and modern attack surfaces.\n\nWe are sharing a few photo highlights from Day 2 here, capturing some of the many valuable interactions and moments from the conference floor.\n\nA sincere thank you to the organisers for delivering a very well-executed event with strong participation, great networking opportunities, and a highly relevant defence agenda.\n\nThank you to:\n\nDI Forsvar og Sikkerhed\nCenSec – Center for Defence, Space & Security\nNaval Team Denmark\nForsvarsministeriets Materiel- og Indkøbsstyrelse\nForsvarets Industrikontor\nBella Center Copenhagen\n\nWe appreciate the many great conversations and look forward to continuing the dialogue after the conference.\n\n#SecPoint #DDAC2026 #CyberSecurity #Defense #NATO\n![secpoint-ddac2026-day2-5.jpg](https://cdn.steemitimages.com/DQmYzmWxGYFjCjYKLq2m7gZnKK1xbuVfXZgtzSQgeRZa8pW/secpoint-ddac2026-day2-5.jpg)\n\n![secpoint-ddac2026-day2-4.jpeg](https://cdn.steemitimages.com/DQmafyTf4Saz8PMvq1frMnJCCuxUDkCiv6u1sYThTtxRrkg/secpoint-ddac2026-day2-4.jpeg)\n\n![secpoint-ddac2026-day2-3.jpeg](https://cdn.steemitimages.com/DQmbPWXJCrbS2jq5WKbKj2atnzyNiaM83rqgXHGFpqfr29v/secpoint-ddac2026-day2-3.jpeg)\n\n![secpoint-ddac2026-day2-2.jpeg](https://cdn.steemitimages.com/DQmZ9G1tAN8PjbfPdcE9ehbkShH4Lxcaf3KSPiQkF7xJCxB/secpoint-ddac2026-day2-2.jpeg)\n\n![secpoint-ddac2026-day2-1.jpeg](https://cdn.steemitimages.com/DQmXXCNyoP38ZCDMrPBzGbKkkUNrwmVjzp76bvxwoB3pysV/secpoint-ddac2026-day2-1.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersec\",\"cybersecurity\",\"ddac2026\",\"defense\",\"nato\"],\"image\":[\"https://cdn.steemitimages.com/DQmYzmWxGYFjCjYKLq2m7gZnKK1xbuVfXZgtzSQgeRZa8pW/secpoint-ddac2026-day2-5.jpg\",\"https://cdn.steemitimages.com/DQmafyTf4Saz8PMvq1frMnJCCuxUDkCiv6u1sYThTtxRrkg/secpoint-ddac2026-day2-4.jpeg\",\"https://cdn.steemitimages.com/DQmbPWXJCrbS2jq5WKbKj2atnzyNiaM83rqgXHGFpqfr29v/secpoint-ddac2026-day2-3.jpeg\",\"https://cdn.steemitimages.com/DQmZ9G1tAN8PjbfPdcE9ehbkShH4Lxcaf3KSPiQkF7xJCxB/secpoint-ddac2026-day2-2.jpeg\",\"https://cdn.steemitimages.com/DQmXXCNyoP38ZCDMrPBzGbKkkUNrwmVjzp76bvxwoB3pysV/secpoint-ddac2026-day2-1.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/09 22:16:09
parent author
parent permlinksecpoint
authorsecpoint
permlinkday-1-recap-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen
titleDay 1 recap from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen
bodyDay 1 recap from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen. It has been a very good and productive first day for SecPoint on the exhibition floor, with strong interest, valuable meetings, and engaging discussions around cybersecurity in today’s evolving defence and hybrid threat landscape. At our booth, we showcased the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall, including real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies relevant to defence organisations and critical infrastructure operators. We were also pleased to see many visitors receive signed copies of our book How They Hack You, sparking great conversations around real-world attack methods, human vulnerabilities, and defensive thinking. DDAC brings together defence leaders, industry stakeholders, government representatives, and security professionals from across Europe and NATO partner nations, making it one of the most important defence and security networking platforms in Denmark. The day concluded with a great networking dinner, offering further opportunity to exchange perspectives and strengthen relationships across the sector. We now look forward to Day 2. DI Danish Defence and Security Industries CenSec – Centre for Defence, Space & Security Naval Team Denmark Forsvarsministeriets Materiel- og Indkøbsstyrelse Bella Arena #SecPoint #DDAC2026 #CyberSecurity #Defense #NATO ![ddacdag18.jpg](https://cdn.steemitimages.com/DQmd6Xt9kF5SgYSqioQuXKbEDUYb1d7gtWeixweJwtNkcE3/ddacdag18.jpg) ![ddacdag17.jpg](https://cdn.steemitimages.com/DQmYZtjGopxtJwL8vBzA7YizJRw1WHfBcxtjvATpR9ikKad/ddacdag17.jpg) ![ddacdag16.jpg](https://cdn.steemitimages.com/DQmaMbkdy4F1iSj9ZLLJ35rKT7ddjnSUas9FXmqfbZFmZSd/ddacdag16.jpg) ![ddacdag15.jpg](https://cdn.steemitimages.com/DQmf9NtkZ87dGpvKU48T1tiexJC5fYwhnAzzfCdTWLConwA/ddacdag15.jpg) ![ddacdag14.jpg](https://cdn.steemitimages.com/DQmV8VAVsjNb9uFD5HWRg3Rkw7dDUmYqRzCafxD8wukeupg/ddacdag14.jpg) ![ddacdag13.jpg](https://cdn.steemitimages.com/DQmSM1QhMw2sGirPS6D5PbGtdkNsaHtXbr3nj2mQkMWKDNU/ddacdag13.jpg) ![ddacdag12.jpg](https://cdn.steemitimages.com/DQmNj52G6Zp9kP5YxsX1bBHPqo2RQWcvwnf5QEep68HoKye/ddacdag12.jpg) ![ddacdag11.jpg](https://cdn.steemitimages.com/DQmZJtWWp1NP5uheu9gFvqrxziHL96dwD9ZjuaMYoPv271a/ddacdag11.jpg)
json metadata{"tags":["secpoint","cybersecurity","ddac2026","defense","nato"],"image":["https://cdn.steemitimages.com/DQmd6Xt9kF5SgYSqioQuXKbEDUYb1d7gtWeixweJwtNkcE3/ddacdag18.jpg","https://cdn.steemitimages.com/DQmYZtjGopxtJwL8vBzA7YizJRw1WHfBcxtjvATpR9ikKad/ddacdag17.jpg","https://cdn.steemitimages.com/DQmaMbkdy4F1iSj9ZLLJ35rKT7ddjnSUas9FXmqfbZFmZSd/ddacdag16.jpg","https://cdn.steemitimages.com/DQmf9NtkZ87dGpvKU48T1tiexJC5fYwhnAzzfCdTWLConwA/ddacdag15.jpg","https://cdn.steemitimages.com/DQmV8VAVsjNb9uFD5HWRg3Rkw7dDUmYqRzCafxD8wukeupg/ddacdag14.jpg","https://cdn.steemitimages.com/DQmSM1QhMw2sGirPS6D5PbGtdkNsaHtXbr3nj2mQkMWKDNU/ddacdag13.jpg","https://cdn.steemitimages.com/DQmNj52G6Zp9kP5YxsX1bBHPqo2RQWcvwnf5QEep68HoKye/ddacdag12.jpg","https://cdn.steemitimages.com/DQmZJtWWp1NP5uheu9gFvqrxziHL96dwD9ZjuaMYoPv271a/ddacdag11.jpg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103357718/Trx b4d5b0c6bafacf509c7bbdd8d68224ca64dee018
View Raw JSON Data
{
  "trx_id": "b4d5b0c6bafacf509c7bbdd8d68224ca64dee018",
  "block": 103357718,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-09T22:16:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "day-1-recap-from-the-danish-defence-annual-conference-ddac-2026-at-bella-arena-in-copenhagen",
      "title": "Day 1 recap from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen",
      "body": "Day 1 recap from the Danish Defence Annual Conference (DDAC) 2026 at Bella Arena in Copenhagen.\n\nIt has been a very good and productive first day for SecPoint on the exhibition floor, with strong interest, valuable meetings, and engaging discussions around cybersecurity in today’s evolving defence and hybrid threat landscape.\n\nAt our booth, we showcased the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall, including real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies relevant to defence organisations and critical infrastructure operators.\n\nWe were also pleased to see many visitors receive signed copies of our book How They Hack You, sparking great conversations around real-world attack methods, human vulnerabilities, and defensive thinking.\n\nDDAC brings together defence leaders, industry stakeholders, government representatives, and security professionals from across Europe and NATO partner nations, making it one of the most important defence and security networking platforms in Denmark.\n\nThe day concluded with a great networking dinner, offering further opportunity to exchange perspectives and strengthen relationships across the sector.\n\nWe now look forward to Day 2.\n\nDI Danish Defence and Security Industries\n\nCenSec – Centre for Defence, Space & Security\n\nNaval Team Denmark\n\nForsvarsministeriets Materiel- og Indkøbsstyrelse\n\n\nBella Arena\n\n#SecPoint #DDAC2026 #CyberSecurity #Defense #NATO\n![ddacdag18.jpg](https://cdn.steemitimages.com/DQmd6Xt9kF5SgYSqioQuXKbEDUYb1d7gtWeixweJwtNkcE3/ddacdag18.jpg)\n\n![ddacdag17.jpg](https://cdn.steemitimages.com/DQmYZtjGopxtJwL8vBzA7YizJRw1WHfBcxtjvATpR9ikKad/ddacdag17.jpg)\n\n![ddacdag16.jpg](https://cdn.steemitimages.com/DQmaMbkdy4F1iSj9ZLLJ35rKT7ddjnSUas9FXmqfbZFmZSd/ddacdag16.jpg)\n\n![ddacdag15.jpg](https://cdn.steemitimages.com/DQmf9NtkZ87dGpvKU48T1tiexJC5fYwhnAzzfCdTWLConwA/ddacdag15.jpg)\n\n![ddacdag14.jpg](https://cdn.steemitimages.com/DQmV8VAVsjNb9uFD5HWRg3Rkw7dDUmYqRzCafxD8wukeupg/ddacdag14.jpg)\n\n![ddacdag13.jpg](https://cdn.steemitimages.com/DQmSM1QhMw2sGirPS6D5PbGtdkNsaHtXbr3nj2mQkMWKDNU/ddacdag13.jpg)\n\n![ddacdag12.jpg](https://cdn.steemitimages.com/DQmNj52G6Zp9kP5YxsX1bBHPqo2RQWcvwnf5QEep68HoKye/ddacdag12.jpg)\n\n![ddacdag11.jpg](https://cdn.steemitimages.com/DQmZJtWWp1NP5uheu9gFvqrxziHL96dwD9ZjuaMYoPv271a/ddacdag11.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"ddac2026\",\"defense\",\"nato\"],\"image\":[\"https://cdn.steemitimages.com/DQmd6Xt9kF5SgYSqioQuXKbEDUYb1d7gtWeixweJwtNkcE3/ddacdag18.jpg\",\"https://cdn.steemitimages.com/DQmYZtjGopxtJwL8vBzA7YizJRw1WHfBcxtjvATpR9ikKad/ddacdag17.jpg\",\"https://cdn.steemitimages.com/DQmaMbkdy4F1iSj9ZLLJ35rKT7ddjnSUas9FXmqfbZFmZSd/ddacdag16.jpg\",\"https://cdn.steemitimages.com/DQmf9NtkZ87dGpvKU48T1tiexJC5fYwhnAzzfCdTWLConwA/ddacdag15.jpg\",\"https://cdn.steemitimages.com/DQmV8VAVsjNb9uFD5HWRg3Rkw7dDUmYqRzCafxD8wukeupg/ddacdag14.jpg\",\"https://cdn.steemitimages.com/DQmSM1QhMw2sGirPS6D5PbGtdkNsaHtXbr3nj2mQkMWKDNU/ddacdag13.jpg\",\"https://cdn.steemitimages.com/DQmNj52G6Zp9kP5YxsX1bBHPqo2RQWcvwnf5QEep68HoKye/ddacdag12.jpg\",\"https://cdn.steemitimages.com/DQmZJtWWp1NP5uheu9gFvqrxziHL96dwD9ZjuaMYoPv271a/ddacdag11.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/06 22:05:18
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-at-the-danish-defence-annual-conference-ddac-2026-here-at-bella-arena-in-copenhagen
titleSecPoint at the Danish Defence Annual Conference (DDAC) 2026 here at Bella Arena in Copenhagen
bodySecPoint at the Danish Defence Annual Conference (DDAC) 2026 here at Bella Arena in Copenhagen. We are set up on the exhibition floor and ready for a full day of discussions, meetings, and live demonstrations focused on cybersecurity in today’s evolving defence and hybrid threat landscape. At our booth, we are showcasing the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall, including real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies. If you are attending, feel free to stop by and meet the SecPoint team. DI Forsvar og sikkerhed CenSec - Center for Defence, Space & Security Naval Team Denmark Bella Center Copenhagen #DDAC2026 #SecPoint #CyberSecurity #Defense #NATO ![ddacpresecpoint1.jpg](https://cdn.steemitimages.com/DQmSR9UBY4VC1GA2uHae1FUybyJToixX2esCAYi1cdXVimn/ddacpresecpoint1.jpg) ![ddacpresecpoint2.jpg](https://cdn.steemitimages.com/DQmaz96XQAh96e7Lhqr5XpU2dkhAuXPrDgjbpRfzUK4cXyi/ddacpresecpoint2.jpg) ![ddacpresecpoint3.jpg](https://cdn.steemitimages.com/DQmR8cS8frohG5PafDD9SopkvuW8k3iiZVLUNC2H6FHiKdu/ddacpresecpoint3.jpg) ![ddacpresecpoint4.jpg](https://cdn.steemitimages.com/DQmecMZAhekzSZMoh5xhBvbAu2TJQkj2vtrAffRP1XQvNKZ/ddacpresecpoint4.jpg)
json metadata{"tags":["secpoint","cybersecurity","cybersec","ddac2026","defense","nato"],"image":["https://cdn.steemitimages.com/DQmSR9UBY4VC1GA2uHae1FUybyJToixX2esCAYi1cdXVimn/ddacpresecpoint1.jpg","https://cdn.steemitimages.com/DQmaz96XQAh96e7Lhqr5XpU2dkhAuXPrDgjbpRfzUK4cXyi/ddacpresecpoint2.jpg","https://cdn.steemitimages.com/DQmR8cS8frohG5PafDD9SopkvuW8k3iiZVLUNC2H6FHiKdu/ddacpresecpoint3.jpg","https://cdn.steemitimages.com/DQmecMZAhekzSZMoh5xhBvbAu2TJQkj2vtrAffRP1XQvNKZ/ddacpresecpoint4.jpg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103271268/Trx 194ed564dcea5b675525580467d3180be3401167
View Raw JSON Data
{
  "trx_id": "194ed564dcea5b675525580467d3180be3401167",
  "block": 103271268,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-06T22:05:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-at-the-danish-defence-annual-conference-ddac-2026-here-at-bella-arena-in-copenhagen",
      "title": "SecPoint at the Danish Defence Annual Conference (DDAC) 2026 here at Bella Arena in Copenhagen",
      "body": "SecPoint at the Danish Defence Annual Conference (DDAC) 2026 here at Bella Arena in Copenhagen.\n\nWe are set up on the exhibition floor and ready for a full day of discussions, meetings, and live demonstrations focused on cybersecurity in today’s evolving defence and hybrid threat landscape.\n\nAt our booth, we are showcasing the SecPoint® Penetrator Vulnerability Scanner and SecPoint® Protector UTM Firewall, including real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies.\n\nIf you are attending, feel free to stop by and meet the SecPoint team.\n\nDI Forsvar og sikkerhed \nCenSec - Center for Defence, Space & Security\nNaval Team Denmark\nBella Center Copenhagen\n\n#DDAC2026 #SecPoint #CyberSecurity #Defense #NATO\n![ddacpresecpoint1.jpg](https://cdn.steemitimages.com/DQmSR9UBY4VC1GA2uHae1FUybyJToixX2esCAYi1cdXVimn/ddacpresecpoint1.jpg)\n\n![ddacpresecpoint2.jpg](https://cdn.steemitimages.com/DQmaz96XQAh96e7Lhqr5XpU2dkhAuXPrDgjbpRfzUK4cXyi/ddacpresecpoint2.jpg)\n\n![ddacpresecpoint3.jpg](https://cdn.steemitimages.com/DQmR8cS8frohG5PafDD9SopkvuW8k3iiZVLUNC2H6FHiKdu/ddacpresecpoint3.jpg)\n\n![ddacpresecpoint4.jpg](https://cdn.steemitimages.com/DQmecMZAhekzSZMoh5xhBvbAu2TJQkj2vtrAffRP1XQvNKZ/ddacpresecpoint4.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersec\",\"ddac2026\",\"defense\",\"nato\"],\"image\":[\"https://cdn.steemitimages.com/DQmSR9UBY4VC1GA2uHae1FUybyJToixX2esCAYi1cdXVimn/ddacpresecpoint1.jpg\",\"https://cdn.steemitimages.com/DQmaz96XQAh96e7Lhqr5XpU2dkhAuXPrDgjbpRfzUK4cXyi/ddacpresecpoint2.jpg\",\"https://cdn.steemitimages.com/DQmR8cS8frohG5PafDD9SopkvuW8k3iiZVLUNC2H6FHiKdu/ddacpresecpoint3.jpg\",\"https://cdn.steemitimages.com/DQmecMZAhekzSZMoh5xhBvbAu2TJQkj2vtrAffRP1XQvNKZ/ddacpresecpoint4.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/02/03 09:10:57
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-and-penetrator-february-2026-software-releases-available
titleSecPoint® Protector & Penetrator – February 2026 Software Releases Available
bodySecPoint® Protector & Penetrator – February 2026 Software Releases Available The February 2026 releases of SecPoint Protector and SecPoint Penetrator are now ready and available for download. Built on the most recent firmware versions, these updates continue to strengthen security, reliability, and performance for both customers and partners. Highlights of the February 2026 releases: • SecPoint Penetrator – based on firmware v66, with improved vulnerability scanning accuracy, updated security checks, and continued scanning enhancements • SecPoint Protector – based on firmware v68, featuring further security hardening, monitoring improvements, and additional IPS refinements This release cycle also includes performance optimizations and ongoing platform improvements aimed at maintaining strong and effective network protection. Available image formats: • Virtual Images (including Proxmox) • Raw Linux Images Access the latest releases via the SecPoint VIP Lounge: https://vip.secpoint.com/ #secpoint #penetrator #protector #proxmox #networksecurity #cybersecurity ![secpoint-software-february-20262.png](https://cdn.steemitimages.com/DQmacLoyPreqcqzVUNuzRo3RLfDeapZWR5Ygiu7CH65mz8F/secpoint-software-february-20262.png)
json metadata{"tags":["secpoint","cybersecurity","cybersec","penetrator","protector","proxmox","networksecurity"],"image":["https://cdn.steemitimages.com/DQmacLoyPreqcqzVUNuzRo3RLfDeapZWR5Ygiu7CH65mz8F/secpoint-software-february-20262.png"],"links":["https://vip.secpoint.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103169599/Trx 0f78f2cdf2415cd25c59bd2691dfaffd3c3e853a
View Raw JSON Data
{
  "trx_id": "0f78f2cdf2415cd25c59bd2691dfaffd3c3e853a",
  "block": 103169599,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-02-03T09:10:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-and-penetrator-february-2026-software-releases-available",
      "title": "SecPoint® Protector & Penetrator – February 2026 Software Releases Available",
      "body": "SecPoint® Protector & Penetrator – February 2026 Software Releases Available\n\nThe February 2026 releases of SecPoint Protector and SecPoint Penetrator are now ready and available for download.\n\nBuilt on the most recent firmware versions, these updates continue to strengthen security, reliability, and performance for both customers and partners.\n\nHighlights of the February 2026 releases:\n• SecPoint Penetrator – based on firmware v66, with improved vulnerability scanning accuracy, updated security checks, and continued scanning enhancements\n• SecPoint Protector – based on firmware v68, featuring further security hardening, monitoring improvements, and additional IPS refinements\n\nThis release cycle also includes performance optimizations and ongoing platform improvements aimed at maintaining strong and effective network protection.\n\nAvailable image formats:\n• Virtual Images (including Proxmox)\n• Raw Linux Images\n\nAccess the latest releases via the SecPoint VIP Lounge:\nhttps://vip.secpoint.com/\n\n#secpoint #penetrator #protector #proxmox #networksecurity #cybersecurity\n![secpoint-software-february-20262.png](https://cdn.steemitimages.com/DQmacLoyPreqcqzVUNuzRo3RLfDeapZWR5Ygiu7CH65mz8F/secpoint-software-february-20262.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cybersec\",\"penetrator\",\"protector\",\"proxmox\",\"networksecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmacLoyPreqcqzVUNuzRo3RLfDeapZWR5Ygiu7CH65mz8F/secpoint-software-february-20262.png\"],\"links\":[\"https://vip.secpoint.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/29 12:16:51
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-2026-price-list-is-now-available-for-download
titleSecPoint® 2026 Price List is now available for download
bodySecPoint® 2026 Price List is now available for download We’ve released the new SecPoint 2026 price list for the Protector™ Firewall and Penetrator™ Vulnerability Scanner, valid from 1 March 2026. What’s new: ✔ Simplified Protector™ editions (Virtual, SFF, and 1U) - built for SMBs, enterprises, and scalable infrastructure ✔ Cleaner licensing models ✔ Optimized product tiers ✔ Available in USD ($) and EUR (€) ✔ Designed for easier partner and customer selection Download via SecPoint® VIP Lounge https://vip.secpoint.com Built on European cybersecurity expertise, developed and supported in Europe - serving customers worldwide with transparency, trust, and full control. #SecPoint #CyberSecurity #Protector #Penetrator #EuropeanCybersecurity #PriceList2026 #ITSecurity #CyberDefense #EUtech ![SecPointPriceList2026.png](https://cdn.steemitimages.com/DQmaGtvGh73bkZU8nu8piQx7GDxcZEP3WE6WvbKLU7qugtM/SecPointPriceList2026.png)
json metadata{"tags":["secpoint","cybersecurity","protector","penetrator","europeancybersecurity","pricelist2026","itsecurity","cyberdefense"],"image":["https://cdn.steemitimages.com/DQmaGtvGh73bkZU8nu8piQx7GDxcZEP3WE6WvbKLU7qugtM/SecPointPriceList2026.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103029613/Trx 105f12ce4a448ba5fe9491b3b4675efa0886ff50
View Raw JSON Data
{
  "trx_id": "105f12ce4a448ba5fe9491b3b4675efa0886ff50",
  "block": 103029613,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-29T12:16:51",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-2026-price-list-is-now-available-for-download",
      "title": "SecPoint® 2026 Price List is now available for download",
      "body": "SecPoint® 2026 Price List is now available for download\n\nWe’ve released the new SecPoint 2026 price list for the Protector™ Firewall and Penetrator™ Vulnerability Scanner, valid from 1 March 2026.\n\nWhat’s new:\n✔ Simplified Protector™ editions (Virtual, SFF, and 1U) - built for SMBs, enterprises, and scalable infrastructure\n✔ Cleaner licensing models\n✔ Optimized product tiers\n✔ Available in USD ($) and EUR (€)\n✔ Designed for easier partner and customer selection\n\nDownload via SecPoint® VIP Lounge\nhttps://vip.secpoint.com\n\nBuilt on European cybersecurity expertise, developed and supported in Europe - serving customers worldwide with transparency, trust, and full control.\n\n#SecPoint #CyberSecurity #Protector #Penetrator #EuropeanCybersecurity #PriceList2026 #ITSecurity #CyberDefense #EUtech\n\n![SecPointPriceList2026.png](https://cdn.steemitimages.com/DQmaGtvGh73bkZU8nu8piQx7GDxcZEP3WE6WvbKLU7qugtM/SecPointPriceList2026.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"protector\",\"penetrator\",\"europeancybersecurity\",\"pricelist2026\",\"itsecurity\",\"cyberdefense\"],\"image\":[\"https://cdn.steemitimages.com/DQmaGtvGh73bkZU8nu8piQx7GDxcZEP3WE6WvbKLU7qugtM/SecPointPriceList2026.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/29 11:58:24
parent author
parent permlinksecpoint
authorsecpoint
permlinkexciting-to-attend-digital-warfare-who-defends-denmark-in-cyberspace
titleExciting to attend “Digital Warfare – Who Defends Denmark in Cyberspace?”
bodyExciting to attend “Digital Warfare – Who Defends Denmark in Cyberspace?” in Copenhagen, arranged by IT-Branchen, PROSA, and DIT Akademi. Important discussions on cyber threats, digital defense, critical infrastructure, and Denmark’s role in an increasingly contested cyberspace. #CyberSecurity #CyberDefense #DigitalWarfare #Denmark #CyberResilience #CriticalInfrastructure ![1.jpeg](https://cdn.steemitimages.com/DQmfQ1i9QFu2yVwwBhgnqLSztAjry7Ye4q32bgiNPNJ7dB4/1.jpeg) ![2.jpeg](https://cdn.steemitimages.com/DQmY97exmTZiLMvd7QscArc4qox4x6rBj4dxTYVxCZuEg8Y/2.jpeg) ![3.jpeg](https://cdn.steemitimages.com/DQmaR7SavudxkVmhFc1MycrmWTPfThzFja7c6GQBTMtD7vg/3.jpeg) ![4.jpeg](https://cdn.steemitimages.com/DQmfFr6ujYVDqNyEyy2Lrgbx9P98jhpikjtmN4UFXUBwnTo/4.jpeg)
json metadata{"tags":["secpoint","cybersecurity","cyberdefense","digitalwarfare","denmark","cyberresilience","criticalinfrastructure"],"image":["https://cdn.steemitimages.com/DQmfQ1i9QFu2yVwwBhgnqLSztAjry7Ye4q32bgiNPNJ7dB4/1.jpeg","https://cdn.steemitimages.com/DQmY97exmTZiLMvd7QscArc4qox4x6rBj4dxTYVxCZuEg8Y/2.jpeg","https://cdn.steemitimages.com/DQmaR7SavudxkVmhFc1MycrmWTPfThzFja7c6GQBTMtD7vg/3.jpeg","https://cdn.steemitimages.com/DQmfFr6ujYVDqNyEyy2Lrgbx9P98jhpikjtmN4UFXUBwnTo/4.jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #103029244/Trx a44b058b4f0ce11badc066d2b55885de7ac934a2
View Raw JSON Data
{
  "trx_id": "a44b058b4f0ce11badc066d2b55885de7ac934a2",
  "block": 103029244,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-29T11:58:24",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "exciting-to-attend-digital-warfare-who-defends-denmark-in-cyberspace",
      "title": "Exciting to attend “Digital Warfare – Who Defends Denmark in Cyberspace?”",
      "body": "Exciting to attend “Digital Warfare – Who Defends Denmark in Cyberspace?” in Copenhagen,\narranged by IT-Branchen, PROSA, and DIT Akademi.\nImportant discussions on cyber threats, digital defense, critical infrastructure, and Denmark’s role in an increasingly contested cyberspace.\n\n#CyberSecurity #CyberDefense #DigitalWarfare #Denmark #CyberResilience #CriticalInfrastructure\n![1.jpeg](https://cdn.steemitimages.com/DQmfQ1i9QFu2yVwwBhgnqLSztAjry7Ye4q32bgiNPNJ7dB4/1.jpeg)\n\n![2.jpeg](https://cdn.steemitimages.com/DQmY97exmTZiLMvd7QscArc4qox4x6rBj4dxTYVxCZuEg8Y/2.jpeg)\n\n![3.jpeg](https://cdn.steemitimages.com/DQmaR7SavudxkVmhFc1MycrmWTPfThzFja7c6GQBTMtD7vg/3.jpeg)\n\n![4.jpeg](https://cdn.steemitimages.com/DQmfFr6ujYVDqNyEyy2Lrgbx9P98jhpikjtmN4UFXUBwnTo/4.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"cyberdefense\",\"digitalwarfare\",\"denmark\",\"cyberresilience\",\"criticalinfrastructure\"],\"image\":[\"https://cdn.steemitimages.com/DQmfQ1i9QFu2yVwwBhgnqLSztAjry7Ye4q32bgiNPNJ7dB4/1.jpeg\",\"https://cdn.steemitimages.com/DQmY97exmTZiLMvd7QscArc4qox4x6rBj4dxTYVxCZuEg8Y/2.jpeg\",\"https://cdn.steemitimages.com/DQmaR7SavudxkVmhFc1MycrmWTPfThzFja7c6GQBTMtD7vg/3.jpeg\",\"https://cdn.steemitimages.com/DQmfFr6ujYVDqNyEyy2Lrgbx9P98jhpikjtmN4UFXUBwnTo/4.jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/26 12:33:12
parent author
parent permlinksecpoint
authorsecpoint
permlinkthe-new-secpoint-penetrator-v66-manual-is-now-available-for-download
titleThe new SecPoint Penetrator v66 Manual is now available for download!
bodyThe new SecPoint Penetrator v66 Manual is now available for download! The documentation has been fully updated to reflect the latest v66 platform SecPoint Penetrator enhancements, including key improvements such as: - Expanded authenticated scanning for Red Hat, CentOS & EulerOS - New database security layer for stronger data protection - Smarter reporting & dashboards - faster parsing, improved charts, enhanced reporting control Plus major usability, performance, and security improvements across the entire platform. Log in to https://vip.secpoint.com to download the new manual. #secpoint #penetrator #cybersecurity #vulnerabilitymanagement #infosec ![SecPoint-Penetrator-Manual-2026-1.png](https://cdn.steemitimages.com/DQmZdnGRQwU6HePNKYWNyKed2h7AbnEKax16zq5t85PnumS/SecPoint-Penetrator-Manual-2026-1.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","vulnerabilitymanagement","infosec"],"image":["https://cdn.steemitimages.com/DQmZdnGRQwU6HePNKYWNyKed2h7AbnEKax16zq5t85PnumS/SecPoint-Penetrator-Manual-2026-1.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102943723/Trx cb5b2d85a74c33a7f0dde4d96bd15c21979ad772
View Raw JSON Data
{
  "trx_id": "cb5b2d85a74c33a7f0dde4d96bd15c21979ad772",
  "block": 102943723,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-26T12:33:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "the-new-secpoint-penetrator-v66-manual-is-now-available-for-download",
      "title": "The new SecPoint Penetrator v66 Manual is now available for download!",
      "body": "The new SecPoint Penetrator v66 Manual is now available for download!\n\nThe documentation has been fully updated to reflect the latest v66 platform SecPoint Penetrator enhancements, including key improvements such as:\n\n- Expanded authenticated scanning for Red Hat, CentOS & EulerOS\n- New database security layer for stronger data protection\n- Smarter reporting & dashboards - faster parsing, improved charts, enhanced reporting control\n\nPlus major usability, performance, and security improvements across the entire platform.\n\nLog in to https://vip.secpoint.com to download the new manual.\n\n#secpoint #penetrator #cybersecurity #vulnerabilitymanagement #infosec\n![SecPoint-Penetrator-Manual-2026-1.png](https://cdn.steemitimages.com/DQmZdnGRQwU6HePNKYWNyKed2h7AbnEKax16zq5t85PnumS/SecPoint-Penetrator-Manual-2026-1.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"vulnerabilitymanagement\",\"infosec\"],\"image\":[\"https://cdn.steemitimages.com/DQmZdnGRQwU6HePNKYWNyKed2h7AbnEKax16zq5t85PnumS/SecPoint-Penetrator-Manual-2026-1.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/23 16:51:54
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-european-cybersecurity
title🇪🇺🌍 SecPoint European Cybersecurity
body🇪🇺🌍 SecPoint European Cybersecurity. Global Trust At SecPoint, we build European cybersecurity and serve customers worldwide. Penetrator® and Protector® are: ✅ 100% European developed ✅ On-prem deployment – full customer control ✅ European R&D and governance ✅ Headquartered in Denmark 🇩🇰 🌍 Trusted by customers in 140+ countries across Europe, Asia, the Middle East, the Americas, Africa, and Oceania. European values. Global reach. Trusted security. https://www.secpoint.com #SecPoint #EuropeanCybersecurity #European #CyberSecurity #Denmark ![secpoint EU v4.png](https://cdn.steemitimages.com/DQmW975ysuccvfrQ13TNtnMfuSU5ePQZHLv55bwj3XfGFnc/secpoint%20EU%20v4.png)
json metadata{"tags":["secpoint","european","europeancybersecurity","cybersecurity","denmark"],"image":["https://cdn.steemitimages.com/DQmW975ysuccvfrQ13TNtnMfuSU5ePQZHLv55bwj3XfGFnc/secpoint%20EU%20v4.png"],"links":["https://www.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102862671/Trx 0cf12732fd22577633b4ba90db839cdf323a95f4
View Raw JSON Data
{
  "trx_id": "0cf12732fd22577633b4ba90db839cdf323a95f4",
  "block": 102862671,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-23T16:51:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-european-cybersecurity",
      "title": "🇪🇺🌍 SecPoint European Cybersecurity",
      "body": "🇪🇺🌍 SecPoint European Cybersecurity. Global Trust\n\nAt SecPoint, we build European cybersecurity and serve customers worldwide.\n\nPenetrator® and Protector® are:\n✅ 100% European developed\n✅ On-prem deployment – full customer control\n✅ European R&D and governance\n✅ Headquartered in Denmark 🇩🇰\n\n🌍 Trusted by customers in 140+ countries across Europe, Asia, the Middle East, the Americas, Africa, and Oceania.\n\nEuropean values. Global reach. Trusted security.\n\nhttps://www.secpoint.com\n\n#SecPoint #EuropeanCybersecurity #European #CyberSecurity #Denmark\n![secpoint EU v4.png](https://cdn.steemitimages.com/DQmW975ysuccvfrQ13TNtnMfuSU5ePQZHLv55bwj3XfGFnc/secpoint%20EU%20v4.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"european\",\"europeancybersecurity\",\"cybersecurity\",\"denmark\"],\"image\":[\"https://cdn.steemitimages.com/DQmW975ysuccvfrQ13TNtnMfuSU5ePQZHLv55bwj3XfGFnc/secpoint%20EU%20v4.png\"],\"links\":[\"https://www.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/23 11:16:57
parent author
parent permlinksecpoint
authorsecpoint
permlinknew-secpoint-penetrator-and-protector-roll-up-banners-for-partners
titleNew SecPoint Penetrator & Protector Roll-Up Banners for Partners
bodyNew SecPoint Penetrator & Protector Roll-Up Banners for Partners We’ve released updated roll-up banners for SecPoint Penetrator and SecPoint Protector Designed for exhibitions, partner events, customer meetings, and conferences. Built to support: • Clear product positioning • Strong visual branding • Professional partner presence • Consistent SecPoint identity • High-quality, print-ready design Ideal for: Events, trade shows, customer demos, partner booths, showrooms, and presentations. Download via Partner Login: https://vip.secpoint.com #SecPoint #CyberSecurity #Partners #PenetrationTesting #VulnerabilityScanning #Firewall ![SecPoint-Penetrator-Protector-RollUp-2026.png](https://cdn.steemitimages.com/DQmcHda3AxJq2ehHvMCw2N1aYNxMcNG1fsqcw8MUymWc7h4/SecPoint-Penetrator-Protector-RollUp-2026.png)
json metadata{"tags":["secpoint","cybersecurity","partners","penetrationtesting","vulnerabilityscanning","firewall"],"image":["https://cdn.steemitimages.com/DQmcHda3AxJq2ehHvMCw2N1aYNxMcNG1fsqcw8MUymWc7h4/SecPoint-Penetrator-Protector-RollUp-2026.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102855984/Trx 22a3b01595d1809fdf87f36c2d5678d6e839f6ff
View Raw JSON Data
{
  "trx_id": "22a3b01595d1809fdf87f36c2d5678d6e839f6ff",
  "block": 102855984,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-23T11:16:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "new-secpoint-penetrator-and-protector-roll-up-banners-for-partners",
      "title": "New SecPoint Penetrator & Protector Roll-Up Banners for Partners",
      "body": "New SecPoint Penetrator & Protector Roll-Up Banners for Partners\n\nWe’ve released updated roll-up banners for SecPoint Penetrator and SecPoint Protector \nDesigned for exhibitions, partner events, customer meetings, and conferences.\n\nBuilt to support:\n• Clear product positioning\n• Strong visual branding\n• Professional partner presence\n• Consistent SecPoint identity\n• High-quality, print-ready design\n\nIdeal for:\nEvents, trade shows, customer demos, partner booths, showrooms, and presentations.\n\nDownload via Partner Login:\nhttps://vip.secpoint.com\n\n#SecPoint #CyberSecurity #Partners #PenetrationTesting #VulnerabilityScanning #Firewall\n\n![SecPoint-Penetrator-Protector-RollUp-2026.png](https://cdn.steemitimages.com/DQmcHda3AxJq2ehHvMCw2N1aYNxMcNG1fsqcw8MUymWc7h4/SecPoint-Penetrator-Protector-RollUp-2026.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"partners\",\"penetrationtesting\",\"vulnerabilityscanning\",\"firewall\"],\"image\":[\"https://cdn.steemitimages.com/DQmcHda3AxJq2ehHvMCw2N1aYNxMcNG1fsqcw8MUymWc7h4/SecPoint-Penetrator-Protector-RollUp-2026.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/20 14:37:48
parent author
parent permlinksecpoint
authorsecpoint
permlinknew-payment-options-lower-fees-and-easier-checkout
titleNew Payment Options – Lower Fees & Easier Checkout
bodyNew Payment Options – Lower Fees & Easier Checkout We’re pleased to announce that SecPoint has upgraded our payment setup to a new, modern payment platform, offering: Lower transaction fees Faster and more user-friendly checkout Support for more payment cards and methods Customers can now pay easily using Visa, Mastercard, AmEx, Diners Club, JCB, and other widely used international cards. This improvement is part of our ongoing effort to make purchasing SecPoint solutions simpler, more flexible, and more cost-effective for customers worldwide. Login now at: https://vip.secpoint.com #SecPoint #Payments #OnlinePayments #SecurePayments #Ecommerce #CyberSecurity #BusinessSecurity #GlobalPayments #B2B ![Elavon.png](https://cdn.steemitimages.com/DQmc88yWDExA1CapyApcmFGzYK7GeKFuiyEKDHri1XAetxw/Elavon.png)
json metadata{"tags":["secpoint","payments","onlinepayments","securepayments","ecommerce","cybersecurity","businesssecurity","globalpayments"],"image":["https://cdn.steemitimages.com/DQmc88yWDExA1CapyApcmFGzYK7GeKFuiyEKDHri1XAetxw/Elavon.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102773765/Trx bddf8defbe99a9db2aa56a7045da018439057ba7
View Raw JSON Data
{
  "trx_id": "bddf8defbe99a9db2aa56a7045da018439057ba7",
  "block": 102773765,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-20T14:37:48",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "new-payment-options-lower-fees-and-easier-checkout",
      "title": "New Payment Options – Lower Fees & Easier Checkout",
      "body": "New Payment Options – Lower Fees & Easier Checkout\n\nWe’re pleased to announce that SecPoint has upgraded our payment setup to a new, modern payment platform, offering:\n\nLower transaction fees\n\nFaster and more user-friendly checkout\n\nSupport for more payment cards and methods\n\nCustomers can now pay easily using Visa, Mastercard, AmEx, Diners Club, JCB, and other widely used international cards.\n\nThis improvement is part of our ongoing effort to make purchasing SecPoint solutions simpler, more flexible, and more cost-effective for customers worldwide.\n\nLogin now at: https://vip.secpoint.com\n\n#SecPoint #Payments #OnlinePayments #SecurePayments #Ecommerce #CyberSecurity #BusinessSecurity #GlobalPayments #B2B\n![Elavon.png](https://cdn.steemitimages.com/DQmc88yWDExA1CapyApcmFGzYK7GeKFuiyEKDHri1XAetxw/Elavon.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"payments\",\"onlinepayments\",\"securepayments\",\"ecommerce\",\"cybersecurity\",\"businesssecurity\",\"globalpayments\"],\"image\":[\"https://cdn.steemitimages.com/DQmc88yWDExA1CapyApcmFGzYK7GeKFuiyEKDHri1XAetxw/Elavon.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/20 12:25:30
parent author
parent permlinksecpoint
authorsecpoint
permlink5xxkhe-secpoint-at-ddac-2026-meet-us-in-bella-arena-copenhagen
titleSecPoint at DDAC 2026 – Meet Us in Bella Arena, Copenhagen
bodyhttps://www.linkedin.com/events/7396533866682900480/ SecPoint at DDAC 2026 – Meet Us in Bella Arena, Copenhagen – Cybersecurity in a New Security Reality In a time of increased geopolitical uncertainty and a rapidly evolving threat landscape, cybersecurity has become a core element of national and allied defence. SecPoint® will be exhibiting at DDAC 2026, Denmark’s leading defence and security conference, taking place February 5–6, 2026 at Bella Arena, Copenhagen. At our booth, we will present live demonstrations of: SecPoint® Penetrator Vulnerability Scanner SecPoint® Protector UTM Firewall including real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies designed for today’s complex environments. With cyber threats playing an increasing role in hybrid warfare, critical infrastructure protection, and NATO-aligned security operations, we look forward to discussing how organizations can strengthen resilience, visibility, and response capabilities. Visitors will also receive signed copies of our new book How They Hack You, offering practical insight into modern attack methods and defensive thinking. If you are attending DDAC, we welcome the opportunity to meet, exchange perspectives, and explore how SecPoint supports organisations operating in a changing security landscape. #SecPoint #DDAC2026 #CyberSecurity #Defense #NATO #HybridThreats #CriticalInfrastructure #VulnerabilityManagement ![ddac.png](https://cdn.steemitimages.com/DQmVh6Re2J23wJWBXa8TggYnyvsi7BLMSycpquf5xLW5v6X/ddac.png)
json metadata{"tags":["secpoint","nato","ddac2026","cybersecurity","defense","hybridthreats","criticalinfrastructure","vulnerabilitymanagement"],"image":["https://cdn.steemitimages.com/DQmVh6Re2J23wJWBXa8TggYnyvsi7BLMSycpquf5xLW5v6X/ddac.png"],"links":["https://www.linkedin.com/events/7396533866682900480/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102771122/Trx 075aa49fef56decb5ff989678c6f6e8d971a7e0a
View Raw JSON Data
{
  "trx_id": "075aa49fef56decb5ff989678c6f6e8d971a7e0a",
  "block": 102771122,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-20T12:25:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "5xxkhe-secpoint-at-ddac-2026-meet-us-in-bella-arena-copenhagen",
      "title": "SecPoint at DDAC 2026 – Meet Us in Bella Arena, Copenhagen",
      "body": "https://www.linkedin.com/events/7396533866682900480/\nSecPoint at DDAC 2026 – Meet Us in Bella Arena, Copenhagen – Cybersecurity in a New Security Reality\n\nIn a time of increased geopolitical uncertainty and a rapidly evolving threat landscape, cybersecurity has become a core element of national and allied defence.\n\nSecPoint® will be exhibiting at DDAC 2026, Denmark’s leading defence and security conference, taking place February 5–6, 2026 at Bella Arena, Copenhagen.\n\nAt our booth, we will present live demonstrations of:\n\nSecPoint® Penetrator Vulnerability Scanner\n\nSecPoint® Protector UTM Firewall\n\nincluding real-world attack scenarios, proactive vulnerability detection, and modern cyber defence strategies designed for today’s complex environments.\n\nWith cyber threats playing an increasing role in hybrid warfare, critical infrastructure protection, and NATO-aligned security operations, we look forward to discussing how organizations can strengthen resilience, visibility, and response capabilities.\n\nVisitors will also receive signed copies of our new book How They Hack You, offering practical insight into modern attack methods and defensive thinking.\n\nIf you are attending DDAC, we welcome the opportunity to meet, exchange perspectives, and explore how SecPoint supports organisations operating in a changing security landscape.\n\n#SecPoint #DDAC2026 #CyberSecurity #Defense #NATO #HybridThreats #CriticalInfrastructure #VulnerabilityManagement\n![ddac.png](https://cdn.steemitimages.com/DQmVh6Re2J23wJWBXa8TggYnyvsi7BLMSycpquf5xLW5v6X/ddac.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"nato\",\"ddac2026\",\"cybersecurity\",\"defense\",\"hybridthreats\",\"criticalinfrastructure\",\"vulnerabilitymanagement\"],\"image\":[\"https://cdn.steemitimages.com/DQmVh6Re2J23wJWBXa8TggYnyvsi7BLMSycpquf5xLW5v6X/ddac.png\"],\"links\":[\"https://www.linkedin.com/events/7396533866682900480/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/16 12:28:36
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-and-penetrator-january-2026-software-releases-available
titleSecPoint® Protector & Penetrator – January 2026 Software Releases Available
bodySecPoint® Protector & Penetrator – January 2026 Software Releases Available We’re pleased to announce that the January 2026 software releases for SecPoint Protector and SecPoint Penetrator are now available for download. These releases are based on the latest firmware versions, delivering meaningful improvements for both customers and partners: • SecPoint Penetrator – based on firmware v66, with enhanced vulnerability scanning capabilities and updated security checks • SecPoint Protector – based on firmware v68, including security hardening, monitoring improvements, and IPS enhancements The January releases include updated vulnerability checks, performance optimizations, and ongoing platform refinements to help protect networks more effectively. Available image formats: • Virtual Images (Including Proxmox) • Raw Linux Images Download the latest releases via the SecPoint VIP Lounge: https://vip.secpoint.com/ #secpoint #penetrator #protector #proxmox #networksecurity #cybersecurity #cybersec ![SecPoint-Jan-2026-Software1.png](https://cdn.steemitimages.com/DQmQ17yzDPSF81uGoJnCbc1jEm9KV9oEzuoMsD7NsRgw9Ag/SecPoint-Jan-2026-Software1.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","protector","proxmox","networksecurity","cybersec"],"image":["https://cdn.steemitimages.com/DQmQ17yzDPSF81uGoJnCbc1jEm9KV9oEzuoMsD7NsRgw9Ag/SecPoint-Jan-2026-Software1.png"],"links":["https://vip.secpoint.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102656478/Trx 3088519d02975885f805bdae3e08a8d5603cf3e1
View Raw JSON Data
{
  "trx_id": "3088519d02975885f805bdae3e08a8d5603cf3e1",
  "block": 102656478,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-16T12:28:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-and-penetrator-january-2026-software-releases-available",
      "title": "SecPoint® Protector & Penetrator – January 2026 Software Releases Available",
      "body": "SecPoint® Protector & Penetrator – January 2026 Software Releases Available\n\nWe’re pleased to announce that the January 2026 software releases for SecPoint Protector and SecPoint Penetrator are now available for download.\n\nThese releases are based on the latest firmware versions, delivering meaningful improvements for both customers and partners:\n\n• SecPoint Penetrator – based on firmware v66, with enhanced vulnerability scanning capabilities and updated security checks\n• SecPoint Protector – based on firmware v68, including security hardening, monitoring improvements, and IPS enhancements\n\nThe January releases include updated vulnerability checks, performance optimizations, and ongoing platform refinements to help protect networks more effectively.\n\nAvailable image formats:\n• Virtual Images (Including Proxmox)\n• Raw Linux Images\n\nDownload the latest releases via the SecPoint VIP Lounge:\nhttps://vip.secpoint.com/\n\n#secpoint #penetrator #protector #proxmox #networksecurity #cybersecurity #cybersec\n![SecPoint-Jan-2026-Software1.png](https://cdn.steemitimages.com/DQmQ17yzDPSF81uGoJnCbc1jEm9KV9oEzuoMsD7NsRgw9Ag/SecPoint-Jan-2026-Software1.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"protector\",\"proxmox\",\"networksecurity\",\"cybersec\"],\"image\":[\"https://cdn.steemitimages.com/DQmQ17yzDPSF81uGoJnCbc1jEm9KV9oEzuoMsD7NsRgw9Ag/SecPoint-Jan-2026-Software1.png\"],\"links\":[\"https://vip.secpoint.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/07 16:51:54
parent author
parent permlinksecpoint
authorsecpoint
permlinkupdated-secpoint-penetrator-vulnerability-scanning-profiles-january-2026-edition
titleUpdated SecPoint Penetrator Vulnerability Scanning Profiles January 2026 edition
bodyUpdated SecPoint Penetrator Vulnerability Scanning Profiles January 2026 edition We have updated our SecPoint Penetrator Vulnerability Scanning Profiles document. The updated document describes 33 vulnerability scanning profiles available in the SecPoint Penetrator, including profile coverage, use cases, and compliance mapping. The document provides a clear overview of: Available scanning profiles Compliance and use case coverage How profiles are applied in real world vulnerability scanning To download the updated document, please log in to our VIP portal and access it from the front page under Penetrator Files. https://vip.secpoint.com/ #SecPoint #VulnerabilityScanning #CyberSecurity #SecPointPenetrator #Penetrator ![SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png](https://cdn.steemitimages.com/DQmWNNBbRyoPECTubavHeezDKHHHgNC8tMXXj7Qrbx2ipqC/SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png)
json metadata{"tags":["secpoint","cybersecurity","vulnerabilityscanning","secpointpenetrator","penetrator"],"image":["https://cdn.steemitimages.com/DQmWNNBbRyoPECTubavHeezDKHHHgNC8tMXXj7Qrbx2ipqC/SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png"],"links":["https://vip.secpoint.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102403067/Trx 2ed7a89e3be56f9ce303d0500efa420106f33a1d
View Raw JSON Data
{
  "trx_id": "2ed7a89e3be56f9ce303d0500efa420106f33a1d",
  "block": 102403067,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-07T16:51:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "updated-secpoint-penetrator-vulnerability-scanning-profiles-january-2026-edition",
      "title": "Updated SecPoint Penetrator Vulnerability Scanning Profiles January 2026 edition",
      "body": "Updated SecPoint Penetrator Vulnerability Scanning Profiles January 2026 edition\n\nWe have updated our SecPoint Penetrator Vulnerability Scanning Profiles document.\n\nThe updated document describes 33 vulnerability scanning profiles available in the SecPoint Penetrator, including profile coverage, use cases, and compliance mapping.\n\nThe document provides a clear overview of:\n\nAvailable scanning profiles\n\nCompliance and use case coverage\n\nHow profiles are applied in real world vulnerability scanning\n\nTo download the updated document, please log in to our VIP portal and access it from the front page under Penetrator Files.\nhttps://vip.secpoint.com/\n\n#SecPoint #VulnerabilityScanning #CyberSecurity #SecPointPenetrator #Penetrator\n![SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png](https://cdn.steemitimages.com/DQmWNNBbRyoPECTubavHeezDKHHHgNC8tMXXj7Qrbx2ipqC/SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"vulnerabilityscanning\",\"secpointpenetrator\",\"penetrator\"],\"image\":[\"https://cdn.steemitimages.com/DQmWNNBbRyoPECTubavHeezDKHHHgNC8tMXXj7Qrbx2ipqC/SecPoint-Penetrator-Vulnerability-Scanning-Profiles1.png\"],\"links\":[\"https://vip.secpoint.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2026/01/05 19:10:18
parent author
parent permlinksecpoint
authorsecpoint
permlinkhappy-new-year-2026-from-secpoint
titleHappy New Year 2026 from SecPoint
bodyHappy New Year 2026 from SecPoint We wish our customers, partners, and colleagues a successful and secure year ahead. Thank you for your continued trust and collaboration. We look forward to working together to protect and strengthen digital infrastructure worldwide. Log in to the SecPoint VIP Lounge to download the latest software images and 2026 partner certifications: https://vip.secpoint.com #SecPoint #CyberSecurity #SecPointPenetrator #Penetrator #InfoSec #NewYear2026 ![SecPoint-Happy-New-Year2026.png](https://cdn.steemitimages.com/DQmYiBwXKrMZsud5yhYeGdmhFY3UPCR6et9jGyxUbhTAW25/SecPoint-Happy-New-Year2026.png)
json metadata{"tags":["secpoint","cybersecurity","secpointpenetrator","penetrator","infosec","newyear2026"],"image":["https://cdn.steemitimages.com/DQmYiBwXKrMZsud5yhYeGdmhFY3UPCR6et9jGyxUbhTAW25/SecPoint-Happy-New-Year2026.png"],"links":["https://vip.secpoint.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #102348340/Trx 9da81859793866e0ad4aff2a46d1f99033000a68
View Raw JSON Data
{
  "trx_id": "9da81859793866e0ad4aff2a46d1f99033000a68",
  "block": 102348340,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-05T19:10:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "happy-new-year-2026-from-secpoint",
      "title": "Happy New Year 2026 from SecPoint",
      "body": "Happy New Year 2026 from SecPoint\n\nWe wish our customers, partners, and colleagues a successful and secure year ahead.\n\nThank you for your continued trust and collaboration.\nWe look forward to working together to protect and strengthen digital infrastructure worldwide.\n\nLog in to the SecPoint VIP Lounge to download the latest software images and 2026 partner certifications:\nhttps://vip.secpoint.com\n\n#SecPoint #CyberSecurity #SecPointPenetrator #Penetrator #InfoSec #NewYear2026\n![SecPoint-Happy-New-Year2026.png](https://cdn.steemitimages.com/DQmYiBwXKrMZsud5yhYeGdmhFY3UPCR6et9jGyxUbhTAW25/SecPoint-Happy-New-Year2026.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"secpointpenetrator\",\"penetrator\",\"infosec\",\"newyear2026\"],\"image\":[\"https://cdn.steemitimages.com/DQmYiBwXKrMZsud5yhYeGdmhFY3UPCR6et9jGyxUbhTAW25/SecPoint-Happy-New-Year2026.png\"],\"links\":[\"https://vip.secpoint.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/25 06:40:42
voteryintercept
authorsecpoint
permlinkmerry-christmas-from-the-secpoint-team
weight10000 (100.00%)
Transaction InfoBlock #102017234/Trx e9391ef1e838407fc81c188808094c59deb04a4a
View Raw JSON Data
{
  "trx_id": "e9391ef1e838407fc81c188808094c59deb04a4a",
  "block": 102017234,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-25T06:40:42",
  "op": [
    "vote",
    {
      "voter": "yintercept",
      "author": "secpoint",
      "permlink": "merry-christmas-from-the-secpoint-team",
      "weight": 10000
    }
  ]
}
2025/12/24 19:49:36
voteryaropol80
authorsecpoint
permlinkmerry-christmas-from-the-secpoint-team
weight10000 (100.00%)
Transaction InfoBlock #102004232/Trx 60a7fb4f203b17693b21c36bf8760fa1bb70f642
View Raw JSON Data
{
  "trx_id": "60a7fb4f203b17693b21c36bf8760fa1bb70f642",
  "block": 102004232,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-24T19:49:36",
  "op": [
    "vote",
    {
      "voter": "yaropol80",
      "author": "secpoint",
      "permlink": "merry-christmas-from-the-secpoint-team",
      "weight": 10000
    }
  ]
}
2025/12/24 12:40:06
parent author
parent permlinksecpoint
authorsecpoint
permlinkmerry-christmas-from-the-secpoint-team
titleMerry Christmas from the SecPoint team 🎄
bodyMerry Christmas from the SecPoint team 🎄 We wish you and your family a joyful and peaceful Christmas. Thank you for your trust and collaboration throughout the year. We look forward to continuing to protect, secure, and strengthen your digital infrastructure in the year ahead. #MerryChristmas #SecPoint #CyberSecurity #Christmas #Partnership #Security ![secpoint-merry-christmas.png](https://cdn.steemitimages.com/DQmZGkCXoMFZcT5BJKTtLGp95ueAyGiLdLwK7KDMzqrePFa/secpoint-merry-christmas.png)
json metadata{"tags":["secpoint","christmas","merrychristmas","cybersecurity","partnership","security"],"image":["https://cdn.steemitimages.com/DQmZGkCXoMFZcT5BJKTtLGp95ueAyGiLdLwK7KDMzqrePFa/secpoint-merry-christmas.png"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101995665/Trx 51ed731e9ed34903abb5779ad08e34dde520248d
View Raw JSON Data
{
  "trx_id": "51ed731e9ed34903abb5779ad08e34dde520248d",
  "block": 101995665,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-24T12:40:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "merry-christmas-from-the-secpoint-team",
      "title": "Merry Christmas from the SecPoint team 🎄",
      "body": "Merry Christmas from the SecPoint team 🎄\n\n\n\nWe wish you and your family a joyful and peaceful Christmas.\n\n\n\nThank you for your trust and collaboration throughout the year.\n\n\n\nWe look forward to continuing to protect, secure, and strengthen your digital infrastructure in the year ahead.\n\n\n\n#MerryChristmas #SecPoint #CyberSecurity #Christmas #Partnership #Security\n![secpoint-merry-christmas.png](https://cdn.steemitimages.com/DQmZGkCXoMFZcT5BJKTtLGp95ueAyGiLdLwK7KDMzqrePFa/secpoint-merry-christmas.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"christmas\",\"merrychristmas\",\"cybersecurity\",\"partnership\",\"security\"],\"image\":[\"https://cdn.steemitimages.com/DQmZGkCXoMFZcT5BJKTtLGp95ueAyGiLdLwK7KDMzqrePFa/secpoint-merry-christmas.png\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/23 11:28:33
parent author
parent permlinksecpoint
authorsecpoint
permlinkmerry-christmas-and-happy-holidays-from-secpoint
title🎄 Merry Christmas & Happy Holidays from SecPoint 🎄
body🎄 Merry Christmas & Happy Holidays from SecPoint 🎄 As the holiday season is here, we would like to thank our customers, partners, and community around the world for the trust and collaboration throughout the year. This season also comes with strong momentum at SecPoint: 🔹 SecPoint Penetrator v66 is coming soon, bringing major improvements in performance, visibility, and usability at scale. 🔹 SecPoint Protector v68 has just been released, delivering a powerful and refined update to our firewall platform. Security never sleeps, not even during the holidays. And if you have not yet had the chance to read How They Hack You?!, our practical cybersecurity book, you are welcome to request a signed copy here: 👉 https://www.secpoint.com/contact-us.html Merry Christmas to those who celebrate, and Happy Holidays to everyone 🎄✨ #SecPoint #CyberSecurity #Penetrator #Protector #HappyHolidays #MerryChristmas #SecurityAwareness ![secpoint-merry-christmas-happy-holidays2025.jpeg](https://cdn.steemitimages.com/DQmXapuGZL85N8Jo7oxcjD8pWaPSCeyZjjhM6PV852Vg6eM/secpoint-merry-christmas-happy-holidays2025.jpeg)
json metadata{"tags":["secpoint","merrychristmas","cybersecurity","penetrator","protector","happyholidays","securityawareness"],"image":["https://cdn.steemitimages.com/DQmXapuGZL85N8Jo7oxcjD8pWaPSCeyZjjhM6PV852Vg6eM/secpoint-merry-christmas-happy-holidays2025.jpeg"],"links":["https://www.secpoint.com/contact-us.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101965583/Trx 848849667d8af04d3283e882b06f19b5b819e309
View Raw JSON Data
{
  "trx_id": "848849667d8af04d3283e882b06f19b5b819e309",
  "block": 101965583,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-23T11:28:33",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "merry-christmas-and-happy-holidays-from-secpoint",
      "title": "🎄 Merry Christmas & Happy Holidays from SecPoint 🎄",
      "body": "🎄 Merry Christmas & Happy Holidays from SecPoint 🎄\n\nAs the holiday season is here, we would like to thank our customers, partners, and community around the world for the trust and collaboration throughout the year.\n\nThis season also comes with strong momentum at SecPoint:\n\n🔹 SecPoint Penetrator v66 is coming soon, bringing major improvements in performance, visibility, and usability at scale.\n🔹 SecPoint Protector v68 has just been released, delivering a powerful and refined update to our firewall platform.\n\nSecurity never sleeps, not even during the holidays.\n\nAnd if you have not yet had the chance to read How They Hack You?!, our practical cybersecurity book, you are welcome to request a signed copy here:\n👉 https://www.secpoint.com/contact-us.html\n\nMerry Christmas to those who celebrate, and Happy Holidays to everyone 🎄✨\n\n#SecPoint #CyberSecurity #Penetrator #Protector #HappyHolidays #MerryChristmas #SecurityAwareness\n![secpoint-merry-christmas-happy-holidays2025.jpeg](https://cdn.steemitimages.com/DQmXapuGZL85N8Jo7oxcjD8pWaPSCeyZjjhM6PV852Vg6eM/secpoint-merry-christmas-happy-holidays2025.jpeg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"merrychristmas\",\"cybersecurity\",\"penetrator\",\"protector\",\"happyholidays\",\"securityawareness\"],\"image\":[\"https://cdn.steemitimages.com/DQmXapuGZL85N8Jo7oxcjD8pWaPSCeyZjjhM6PV852Vg6eM/secpoint-merry-christmas-happy-holidays2025.jpeg\"],\"links\":[\"https://www.secpoint.com/contact-us.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/22 16:32:39
parent author
parent permlinksecpoint
authorsecpoint
permlinkstrengthening-cybersecurity-in-indonesia
title🤝 Strengthening Cybersecurity in Indonesia 🇮🇩
body🤝 Strengthening Cybersecurity in Indonesia 🇮🇩 Our partnership with PT Prospera Aswindra Teknologi continues to grow as we work together to support organizations across Indonesia. As SecPoint’s official partner, Prospera Aswindra delivers SecPoint Penetrator™ and SecPoint Protector™, combining proven security technology with strong local expertise. Together, we help businesses improve visibility, reduce risk, and defend against real-world cyber threats. 🔐 A strong local partner makes all the difference. #SecPoint #CyberSecurity #Indonesia #Penetrator #Protector #ProsperaAswindra ![secpoint-asw1.jpg](https://cdn.steemitimages.com/DQmVZwKhaVpMPsnsiNyi52aTMNhLAqsUcqAt6wNCNGewuBV/secpoint-asw1.jpg) ![secpoint-asw2.jpg](https://cdn.steemitimages.com/DQmPJ4KvPjZs1uxiZJBk1mY3AvixhQ3n45qD7wJDNrmoPQs/secpoint-asw2.jpg)
json metadata{"tags":["secpoint","cybersecurity","indonesia","penetrator","protector","prosperaaswindra"],"image":["https://cdn.steemitimages.com/DQmVZwKhaVpMPsnsiNyi52aTMNhLAqsUcqAt6wNCNGewuBV/secpoint-asw1.jpg","https://cdn.steemitimages.com/DQmPJ4KvPjZs1uxiZJBk1mY3AvixhQ3n45qD7wJDNrmoPQs/secpoint-asw2.jpg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101943157/Trx 2618dfdbd60a99b58705df445575e3007c25afdc
View Raw JSON Data
{
  "trx_id": "2618dfdbd60a99b58705df445575e3007c25afdc",
  "block": 101943157,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-22T16:32:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "strengthening-cybersecurity-in-indonesia",
      "title": "🤝 Strengthening Cybersecurity in Indonesia 🇮🇩",
      "body": "🤝 Strengthening Cybersecurity in Indonesia 🇮🇩\n\nOur partnership with PT Prospera Aswindra Teknologi continues to grow as we work together to support organizations across Indonesia.\n\nAs SecPoint’s official partner, Prospera Aswindra delivers SecPoint Penetrator™ and SecPoint Protector™, combining proven security technology with strong local expertise.\n\nTogether, we help businesses improve visibility, reduce risk, and defend against real-world cyber threats.\n\n🔐 A strong local partner makes all the difference.\n\n#SecPoint #CyberSecurity #Indonesia #Penetrator #Protector #ProsperaAswindra\n\n![secpoint-asw1.jpg](https://cdn.steemitimages.com/DQmVZwKhaVpMPsnsiNyi52aTMNhLAqsUcqAt6wNCNGewuBV/secpoint-asw1.jpg)\n\n![secpoint-asw2.jpg](https://cdn.steemitimages.com/DQmPJ4KvPjZs1uxiZJBk1mY3AvixhQ3n45qD7wJDNrmoPQs/secpoint-asw2.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"indonesia\",\"penetrator\",\"protector\",\"prosperaaswindra\"],\"image\":[\"https://cdn.steemitimages.com/DQmVZwKhaVpMPsnsiNyi52aTMNhLAqsUcqAt6wNCNGewuBV/secpoint-asw1.jpg\",\"https://cdn.steemitimages.com/DQmPJ4KvPjZs1uxiZJBk1mY3AvixhQ3n45qD7wJDNrmoPQs/secpoint-asw2.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/18 15:08:12
parent author
parent permlinksecpoint
authorsecpoint
permlinkafter-our-book-reception-i-am-proud-to-share-these-new-photos-from-copenhagen
titleAfter our book reception, I am proud to share these new photos from Copenhagen
bodyAfter our book reception, I am proud to share these new photos from Copenhagen, the capital of Denmark, with my new book How They Hack You?! This book is direct, practical, and built on real attack methods that impact companies and people every day. It is written to make cybersecurity understandable without watering it down, and to show clearly how attackers think, move, and succeed, and what you can do to reduce risk. If you want a free signed copy of How They Hack You?!, please fill out the contact form here: https://www.secpoint.com/contact-us.html Free copies are available while stock lasts. If you are interested in the new Proxmox images for the SecPoint Penetrator and Protector, you can request details via the same form. #SecPoint #Copenhagen #CyberSecurity #HowTheyHackYou #Proxmox ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg](https://cdn.steemitimages.com/DQmWxysCGpDMrLMpK6aSzoF6bLkZcy3tSKYdvAmbQBaEetM/SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg](https://cdn.steemitimages.com/DQmY5X9SWHBwN6ymuNCqNVRNLt9MbMhMgjzMjWqcvjjWjep/SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg](https://cdn.steemitimages.com/DQmSzzcQ7jzTQJM7SNq2T85s93qDFazh1Vf6JtyENnSqRAK/SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg](https://cdn.steemitimages.com/DQmXVhzerYBuKZCRXVRX5rF2ihkDVNmkyrJmtbfu8oP1Vnk/SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg](https://cdn.steemitimages.com/DQmcdzC67S2HEFYj4HG99wJLorXm8XiDkjhdsMAp2wR2pER/SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg](https://cdn.steemitimages.com/DQmXjs4gBLwoJPfmxL56RUTUg26PTfGE3NCsyJE29W7jjyj/SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg](https://cdn.steemitimages.com/DQmXuS8hvaeWxJrm52oLjibUCKzzHFeGBVJ3U8BNA5L5Ktt/SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg) ![SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg](https://cdn.steemitimages.com/DQmQhFi7rowCmXXmVDj2F7NsirdHEKY3q69998gyXRkcWz5/SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg)
json metadata{"tags":["secpoint","copenhagen","denmark","cybersecurity","howtheyhackyou","proxmox"],"image":["https://cdn.steemitimages.com/DQmWxysCGpDMrLMpK6aSzoF6bLkZcy3tSKYdvAmbQBaEetM/SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg","https://cdn.steemitimages.com/DQmY5X9SWHBwN6ymuNCqNVRNLt9MbMhMgjzMjWqcvjjWjep/SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg","https://cdn.steemitimages.com/DQmSzzcQ7jzTQJM7SNq2T85s93qDFazh1Vf6JtyENnSqRAK/SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg","https://cdn.steemitimages.com/DQmXVhzerYBuKZCRXVRX5rF2ihkDVNmkyrJmtbfu8oP1Vnk/SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg","https://cdn.steemitimages.com/DQmcdzC67S2HEFYj4HG99wJLorXm8XiDkjhdsMAp2wR2pER/SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg","https://cdn.steemitimages.com/DQmXjs4gBLwoJPfmxL56RUTUg26PTfGE3NCsyJE29W7jjyj/SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg","https://cdn.steemitimages.com/DQmXuS8hvaeWxJrm52oLjibUCKzzHFeGBVJ3U8BNA5L5Ktt/SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg","https://cdn.steemitimages.com/DQmQhFi7rowCmXXmVDj2F7NsirdHEKY3q69998gyXRkcWz5/SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg"],"links":["https://www.secpoint.com/contact-us.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101826560/Trx b8a74d7d26bf28da042b4669740b88bc6a8d849c
View Raw JSON Data
{
  "trx_id": "b8a74d7d26bf28da042b4669740b88bc6a8d849c",
  "block": 101826560,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-18T15:08:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "after-our-book-reception-i-am-proud-to-share-these-new-photos-from-copenhagen",
      "title": "After our book reception, I am proud to share these new photos from Copenhagen",
      "body": "After our book reception, I am proud to share these new photos from Copenhagen, the capital of Denmark, with my new book How They Hack You?!\n\nThis book is direct, practical, and built on real attack methods that impact companies and people every day. \nIt is written to make cybersecurity understandable without watering it down, and to show clearly how attackers think, move, and succeed, and what you can do to reduce risk.\n\nIf you want a free signed copy of How They Hack You?!, please fill out the contact form here:\nhttps://www.secpoint.com/contact-us.html\nFree copies are available while stock lasts.\n\nIf you are interested in the new Proxmox images for the SecPoint Penetrator and Protector, you can request details via the same form.\n\n#SecPoint #Copenhagen #CyberSecurity #HowTheyHackYou #Proxmox\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg](https://cdn.steemitimages.com/DQmWxysCGpDMrLMpK6aSzoF6bLkZcy3tSKYdvAmbQBaEetM/SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg](https://cdn.steemitimages.com/DQmY5X9SWHBwN6ymuNCqNVRNLt9MbMhMgjzMjWqcvjjWjep/SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg](https://cdn.steemitimages.com/DQmSzzcQ7jzTQJM7SNq2T85s93qDFazh1Vf6JtyENnSqRAK/SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg](https://cdn.steemitimages.com/DQmXVhzerYBuKZCRXVRX5rF2ihkDVNmkyrJmtbfu8oP1Vnk/SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg](https://cdn.steemitimages.com/DQmcdzC67S2HEFYj4HG99wJLorXm8XiDkjhdsMAp2wR2pER/SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg](https://cdn.steemitimages.com/DQmXjs4gBLwoJPfmxL56RUTUg26PTfGE3NCsyJE29W7jjyj/SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg](https://cdn.steemitimages.com/DQmXuS8hvaeWxJrm52oLjibUCKzzHFeGBVJ3U8BNA5L5Ktt/SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg)\n\n![SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg](https://cdn.steemitimages.com/DQmQhFi7rowCmXXmVDj2F7NsirdHEKY3q69998gyXRkcWz5/SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"copenhagen\",\"denmark\",\"cybersecurity\",\"howtheyhackyou\",\"proxmox\"],\"image\":[\"https://cdn.steemitimages.com/DQmWxysCGpDMrLMpK6aSzoF6bLkZcy3tSKYdvAmbQBaEetM/SecPoint-Howtheyhackyou-Copenhagen-December-2025-1.jpg\",\"https://cdn.steemitimages.com/DQmY5X9SWHBwN6ymuNCqNVRNLt9MbMhMgjzMjWqcvjjWjep/SecPoint-Howtheyhackyou-Copenhagen-December-2025-2.jpg\",\"https://cdn.steemitimages.com/DQmSzzcQ7jzTQJM7SNq2T85s93qDFazh1Vf6JtyENnSqRAK/SecPoint-Howtheyhackyou-Copenhagen-December-2025-3.jpg\",\"https://cdn.steemitimages.com/DQmXVhzerYBuKZCRXVRX5rF2ihkDVNmkyrJmtbfu8oP1Vnk/SecPoint-Howtheyhackyou-Copenhagen-December-2025-4.jpg\",\"https://cdn.steemitimages.com/DQmcdzC67S2HEFYj4HG99wJLorXm8XiDkjhdsMAp2wR2pER/SecPoint-Howtheyhackyou-Copenhagen-December-2025-5.jpg\",\"https://cdn.steemitimages.com/DQmXjs4gBLwoJPfmxL56RUTUg26PTfGE3NCsyJE29W7jjyj/SecPoint-Howtheyhackyou-Copenhagen-December-2025-6.jpg\",\"https://cdn.steemitimages.com/DQmXuS8hvaeWxJrm52oLjibUCKzzHFeGBVJ3U8BNA5L5Ktt/SecPoint-Howtheyhackyou-Copenhagen-December-2025-7.jpg\",\"https://cdn.steemitimages.com/DQmQhFi7rowCmXXmVDj2F7NsirdHEKY3q69998gyXRkcWz5/SecPoint-Howtheyhackyou-Copenhagen-December-2025-8.jpg\"],\"links\":[\"https://www.secpoint.com/contact-us.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/18 13:02:24
parent author
parent permlinksecpoint
authorsecpoint
permlinksign-up-for-a-free-secpoint-webinar-where-we-walk-you-through-what-s-new-in
titleSign up for a free SecPoint webinar where we walk you through what’s new in:
bodySign up for a free SecPoint webinar where we walk you through what’s new in: • SecPoint Penetrator v65 • SecPoint Protector v68 This is scheduled individually after signup (not a fixed public webinar). You are welcome to join with your entire team. Sign up here: https://www.secpoint.com/contact-us.html #secpoint #cybersecurity #penetrator #protector #vulnerabilityscanning #firewall #networksecurity ![SecPointLogoInstagram.png](https://cdn.steemitimages.com/DQmPzLBUhJhgs7wQKdxuEeuUkjjDmndFt1r1JTPLfe7eR4q/SecPointLogoInstagram.png)
json metadata{"tags":["secpoint","cybersecurity","penetrator","protector","vulnerabilityscanning","firewall","networksecurity"],"image":["https://cdn.steemitimages.com/DQmPzLBUhJhgs7wQKdxuEeuUkjjDmndFt1r1JTPLfe7eR4q/SecPointLogoInstagram.png"],"links":["https://www.secpoint.com/contact-us.html"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101824047/Trx c1b38a48e54d0a57d29186346401906114d240f4
View Raw JSON Data
{
  "trx_id": "c1b38a48e54d0a57d29186346401906114d240f4",
  "block": 101824047,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-18T13:02:24",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "sign-up-for-a-free-secpoint-webinar-where-we-walk-you-through-what-s-new-in",
      "title": "Sign up for a free SecPoint webinar where we walk you through what’s new in:",
      "body": "Sign up for a free SecPoint webinar where we walk you through what’s new in:\n\n• SecPoint Penetrator v65\n• SecPoint Protector v68\n\nThis is scheduled individually after signup (not a fixed public webinar).\n\nYou are welcome to join with your entire team.\n\nSign up here: https://www.secpoint.com/contact-us.html\n\n#secpoint #cybersecurity #penetrator #protector #vulnerabilityscanning #firewall #networksecurity\n![SecPointLogoInstagram.png](https://cdn.steemitimages.com/DQmPzLBUhJhgs7wQKdxuEeuUkjjDmndFt1r1JTPLfe7eR4q/SecPointLogoInstagram.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"penetrator\",\"protector\",\"vulnerabilityscanning\",\"firewall\",\"networksecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmPzLBUhJhgs7wQKdxuEeuUkjjDmndFt1r1JTPLfe7eR4q/SecPointLogoInstagram.png\"],\"links\":[\"https://www.secpoint.com/contact-us.html\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/12 13:01:18
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-protector-v68-is-now-available-and-delivers-our-most-powerful-firmware-upgrade-to-date
titleSecPoint Protector V68 is now available and delivers our most powerful firmware upgrade to date.
bodyhttps://www.youtube.com/watch?v=AGuG-UAGUiU SecPoint Protector V68 is now available and delivers our most powerful firmware upgrade to date. What is new in V68: Significantly improved visibility into attacks The Attack Map now shows all activity, including internal and local threats Attack statistics extended to 48 hours, giving administrators better insight into attack patterns and long running or coordinated activity Administration improvements: New notes field for White and Block listings Document why an entry was added, who requested it, and any important context Clearer administration, and safer long term list management Connectivity improvements: Public DNS checks removed Cleaner status validation and tighter control using SecPoint’s own secured infrastructure Watch the release video on YouTube to see what is new in SecPoint Protector V68. #SecPoint #Protector #Firewall #UTM #CyberSecurity #NetworkSecurity #IntrusionPrevention #IPS #FirmwareUpdate
json metadata{"tags":["secpoint","protector","firewall","utm","cybersecurity","networksecurity","intrusionprevention","ips"],"image":["https://img.youtube.com/vi/AGuG-UAGUiU/0.jpg"],"links":["https://www.youtube.com/watch?v=AGuG-UAGUiU"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101651584/Trx 1c11b3844c886597e2fd7e9cf54fcd362d84c99b
View Raw JSON Data
{
  "trx_id": "1c11b3844c886597e2fd7e9cf54fcd362d84c99b",
  "block": 101651584,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-12T13:01:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-protector-v68-is-now-available-and-delivers-our-most-powerful-firmware-upgrade-to-date",
      "title": "SecPoint Protector V68 is now available and delivers our most powerful firmware upgrade to date.",
      "body": "https://www.youtube.com/watch?v=AGuG-UAGUiU\n\nSecPoint Protector V68 is now available and delivers our most powerful firmware upgrade to date.\n\nWhat is new in V68:\n\nSignificantly improved visibility into attacks\n\nThe Attack Map now shows all activity, including internal and local threats\n\nAttack statistics extended to 48 hours, giving administrators better insight into attack patterns and long running or coordinated activity\n\nAdministration improvements:\n\nNew notes field for White and Block listings\n\nDocument why an entry was added, who requested it, and any important context\n\nClearer administration, and safer long term list management\n\nConnectivity improvements:\n\nPublic DNS checks removed\n\nCleaner status validation and tighter control using SecPoint’s own secured infrastructure\n\nWatch the release video on YouTube to see what is new in SecPoint Protector V68.\n\n#SecPoint #Protector #Firewall #UTM #CyberSecurity #NetworkSecurity #IntrusionPrevention #IPS #FirmwareUpdate",
      "json_metadata": "{\"tags\":[\"secpoint\",\"protector\",\"firewall\",\"utm\",\"cybersecurity\",\"networksecurity\",\"intrusionprevention\",\"ips\"],\"image\":[\"https://img.youtube.com/vi/AGuG-UAGUiU/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=AGuG-UAGUiU\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/10 14:07:24
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-penetrator-and-protector-now-available-as-proxmox-images
titleSecPoint® Penetrator and Protector now available as Proxmox images
bodySecPoint® Penetrator and Protector now available as Proxmox images We are pleased to announce that both SecPoint Penetrator & Protector UTM Firewall are now officially available as Proxmox virtual appliances. This makes it even easier for organizations and partners to deploy SecPoint solutions in modern on-premise and private cloud environments using Proxmox. ✅ Direct Proxmox import ✅ Fast deployment ✅ Full feature support ✅ Ideal for production and testing ✅ No ESXi dependency You can download the Proxmox images directly from our VIP portal: https;//vip.secpoint.com/ #secpoint #cybersecurity #proxmox #penetrator #protector #networksecurity #infosecurity #itsecurity ![secpoint-proxmox3.png](https://cdn.steemitimages.com/DQmeHGdgjjTXMFmQpEqHcsMN8oV3XGs9W5eh9yxrGu8EVNq/secpoint-proxmox3.png)
json metadata{"tags":["secpoint","cybersecurity","proxmox","penetrator","protector","networksecurity","infosecurity","itsecurity"],"image":["https://cdn.steemitimages.com/DQmeHGdgjjTXMFmQpEqHcsMN8oV3XGs9W5eh9yxrGu8EVNq/secpoint-proxmox3.png"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101595429/Trx 0d608a8e7ea899c04309ceb55d4f2e50b754c2c0
View Raw JSON Data
{
  "trx_id": "0d608a8e7ea899c04309ceb55d4f2e50b754c2c0",
  "block": 101595429,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-10T14:07:24",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-penetrator-and-protector-now-available-as-proxmox-images",
      "title": "SecPoint® Penetrator and Protector now available as Proxmox images",
      "body": "SecPoint® Penetrator and Protector now available as Proxmox images\n\nWe are pleased to announce that both SecPoint Penetrator & Protector UTM Firewall are now officially available as Proxmox virtual appliances.\n\nThis makes it even easier for organizations and partners to deploy SecPoint solutions in modern on-premise and private cloud environments using Proxmox.\n\n✅ Direct Proxmox import\n✅ Fast deployment\n✅ Full feature support\n✅ Ideal for production and testing\n✅ No ESXi dependency\n\nYou can download the Proxmox images directly from our VIP portal:\nhttps;//vip.secpoint.com/\n\n#secpoint #cybersecurity #proxmox #penetrator #protector #networksecurity #infosecurity #itsecurity\n![secpoint-proxmox3.png](https://cdn.steemitimages.com/DQmeHGdgjjTXMFmQpEqHcsMN8oV3XGs9W5eh9yxrGu8EVNq/secpoint-proxmox3.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersecurity\",\"proxmox\",\"penetrator\",\"protector\",\"networksecurity\",\"infosecurity\",\"itsecurity\"],\"image\":[\"https://cdn.steemitimages.com/DQmeHGdgjjTXMFmQpEqHcsMN8oV3XGs9W5eh9yxrGu8EVNq/secpoint-proxmox3.png\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/09 12:09:30
parent author
parent permlinksecpoint
authorsecpoint
permlinkfind-out-if-you-are-vulnerable-to-the-react2shell-vulnerability
titleFind out if you are vulnerable to the React2Shell vulnerability
bodyFind out if you are vulnerable to the React2Shell vulnerability, covering both official tracking IDs: • React Server Component exposure – CVE-2025-55182 • Next.js App Router RCE chain – CVE-2025-66478 The SecPoint Penetrator verifies real-world exploitability using remote execution indicators for the Next.js RCE chain and correlates this with React Server Component exposure, helping organizations identify whether they are truly exposed, not just theoretically vulnerable. If you are running modern Next.js App Router deployments, this is a critical check to include in your security assessments. #secpoint #secpointpenetrator #nextrce #react2shell #cve #cybersecurity #vulnerabilityscanning #nextjs #react ![secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png](https://cdn.steemitimages.com/DQmRFq3QtE7Eegbp1W6VV8hBwA6RxfhzPwvrXXZBcwp9J1D/secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png)
json metadata{"tags":["secpoint","react","secpointpenetrator","nextrce","react2shell","cve","cybersecurity","vulnerabilityscanning"],"image":["https://cdn.steemitimages.com/DQmRFq3QtE7Eegbp1W6VV8hBwA6RxfhzPwvrXXZBcwp9J1D/secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101564349/Trx 729c553a1d97d27972e2417bcb2861da905147c2
View Raw JSON Data
{
  "trx_id": "729c553a1d97d27972e2417bcb2861da905147c2",
  "block": 101564349,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-09T12:09:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "find-out-if-you-are-vulnerable-to-the-react2shell-vulnerability",
      "title": "Find out if you are vulnerable to the React2Shell vulnerability",
      "body": "Find out if you are vulnerable to the React2Shell vulnerability, covering both official tracking IDs:\n\n• React Server Component exposure – CVE-2025-55182\n• Next.js App Router RCE chain – CVE-2025-66478\n\nThe SecPoint Penetrator verifies real-world exploitability using remote execution indicators for the Next.js RCE chain and correlates this with React Server Component exposure, helping organizations identify whether they are truly exposed, not just theoretically vulnerable.\n\nIf you are running modern Next.js App Router deployments, this is a critical check to include in your security assessments.\n\n#secpoint #secpointpenetrator #nextrce #react2shell #cve #cybersecurity #vulnerabilityscanning #nextjs #react\n![secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png](https://cdn.steemitimages.com/DQmRFq3QtE7Eegbp1W6VV8hBwA6RxfhzPwvrXXZBcwp9J1D/secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png)",
      "json_metadata": "{\"tags\":[\"secpoint\",\"react\",\"secpointpenetrator\",\"nextrce\",\"react2shell\",\"cve\",\"cybersecurity\",\"vulnerabilityscanning\"],\"image\":[\"https://cdn.steemitimages.com/DQmRFq3QtE7Eegbp1W6VV8hBwA6RxfhzPwvrXXZBcwp9J1D/secpoint-nextrce-cve-2025-55182-cve-2025-66478V3.png\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/08 19:19:09
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-r-protector-tm-v68-notes-field-for-white-and-block-listings
titleSecPoint® Protector™ V68 – Notes Field for White and Block Listings
bodyhttps://www.youtube.com/watch?v=B5Grfk44JAE SecPoint® Protector™ V68 – Notes Field for White and Block Listings Protector V68 introduces a new Notes field for White and Block Listings, making Anti Spam administration clearer, safer, and easier to manage. Administrators can now document why an entry was added, who requested it, and any important context. This reduces errors, prevents duplicate entries, and improves long term list maintenance. Available directly in Anti Spam White and Block Listings, Advanced Options, and the Mail Archiver. #secpoint #cybersecurity #protector #firewall #antispam #networksecurity #utmfirewall
json metadata{"tags":["secpoint","cybersec","cybersecurity","protector","firewall","antispam","networksecurity","utmfirewall"],"image":["https://img.youtube.com/vi/B5Grfk44JAE/0.jpg"],"links":["https://www.youtube.com/watch?v=B5Grfk44JAE"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101544187/Trx b67943a86e3d1701b537d3edf5b2ca9afc4372ce
View Raw JSON Data
{
  "trx_id": "b67943a86e3d1701b537d3edf5b2ca9afc4372ce",
  "block": 101544187,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-08T19:19:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-tm-v68-notes-field-for-white-and-block-listings",
      "title": "SecPoint® Protector™ V68 – Notes Field for White and Block Listings",
      "body": "https://www.youtube.com/watch?v=B5Grfk44JAE\nSecPoint® Protector™ V68 – Notes Field for White and Block Listings\n\nProtector V68 introduces a new Notes field for White and Block Listings, making Anti Spam administration clearer, safer, and easier to manage.\n\nAdministrators can now document why an entry was added, who requested it, and any important context. \n\nThis reduces errors, prevents duplicate entries, and improves long term list maintenance.\n\nAvailable directly in Anti Spam White and Block Listings, Advanced Options, and the Mail Archiver.\n\n#secpoint #cybersecurity #protector #firewall #antispam #networksecurity #utmfirewall",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersec\",\"cybersecurity\",\"protector\",\"firewall\",\"antispam\",\"networksecurity\",\"utmfirewall\"],\"image\":[\"https://img.youtube.com/vi/B5Grfk44JAE/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=B5Grfk44JAE\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/03 10:29:54
parent author
parent permlinkcybersecurity
authorsecpoint
permlinksecpoint-r-protector-v68-system-status-improvements
titleSecPoint® Protector V68 – System Status Improvements
bodyhttps://www.youtube.com/watch?v=W2PH3vm9Mt8 SecPoint® Protector V68 – System Status Improvements The new V68 firmware brings important upgrades to the System Status and Connectivity Checks, making the Protector even more secure, reliable, and compliant with modern cybersecurity standards. Key Enhancements: ✅ Secure-only update validation V68 enforcing best-practice security for all update communication. ✅ No more external DNS checks The Protector no longer contacts public DNS services to verify connectivity. Online status is now confirmed exclusively via secure communication with SecPoint’s infrastructure, resulting in more accurate system reporting and fewer false alerts. These improvements deliver a cleaner, safer, and more reliable system status, helping ensure your Protector stays fully updated, fully secure, and fully trusted. #cybersecurity #secpoint #protector #firewall #networksecurity #cyberdefense
json metadata{"tags":["cybersecurity","secpoint","protector","firewall","networksecurity","cyberdefense"],"image":["https://img.youtube.com/vi/W2PH3vm9Mt8/0.jpg"],"links":["https://www.youtube.com/watch?v=W2PH3vm9Mt8"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101389908/Trx 0005ac60cfcafdf3c1118a78c45a93d79f2f227b
View Raw JSON Data
{
  "trx_id": "0005ac60cfcafdf3c1118a78c45a93d79f2f227b",
  "block": 101389908,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-03T10:29:54",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "secpoint",
      "permlink": "secpoint-r-protector-v68-system-status-improvements",
      "title": "SecPoint® Protector V68 – System Status Improvements",
      "body": "https://www.youtube.com/watch?v=W2PH3vm9Mt8\nSecPoint® Protector V68 – System Status Improvements\n\nThe new V68 firmware brings important upgrades to the System Status and Connectivity Checks, making the Protector even more secure, reliable, and compliant with modern cybersecurity standards.\n\nKey Enhancements:\n\n✅ Secure-only update validation\nV68 enforcing best-practice security for all update communication.\n\n✅ No more external DNS checks\nThe Protector no longer contacts public DNS services to verify connectivity.\nOnline status is now confirmed exclusively via secure communication with SecPoint’s infrastructure, resulting in more accurate system reporting and fewer false alerts.\n\nThese improvements deliver a cleaner, safer, and more reliable system status, helping ensure your Protector stays fully updated, fully secure, and fully trusted.\n\n#cybersecurity #secpoint #protector #firewall #networksecurity #cyberdefense",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"secpoint\",\"protector\",\"firewall\",\"networksecurity\",\"cyberdefense\"],\"image\":[\"https://img.youtube.com/vi/W2PH3vm9Mt8/0.jpg\"],\"links\":[\"https://www.youtube.com/watch?v=W2PH3vm9Mt8\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2025/12/02 22:09:09
parent author
parent permlinksecpoint
authorsecpoint
permlinksecpoint-joins-defence-network-north-we-are-pleased-to-announce-that-secpoint-is-now-an-official-member-of-defence-network-north
titleSecPoint joins Defence Network North We are pleased to announce that SecPoint is now an official member of Defence Network North (DNN)
body![defence_network_north_logo (1).jpeg](https://cdn.steemitimages.com/DQmbo9ZgSz7ZQgFJZUHcHeeArnydStrmZc5rrdoGXFCm2PV/defence_network_north_logo%20(1).jpeg) SecPoint joins Defence Network North We are pleased to announce that SecPoint is now an official member of Defence Network North (DNN). This strengthens our engagement in the Danish and Nordic defence ecosystem and supports our mission to deliver advanced cyber security solutions to partners across defence, government, and critical infrastructure. DNN provides a strong community for companies that collaborate, share knowledge, and work together to enhance security across Denmark and Northern Europe. We look forward to contributing with our expertise in vulnerability scanning, protection against cyber threats, and secure infrastructure. A warm thank you to Jarl Lundin Overbeck for the invitation and introduction. We look forward to meeting the network, joining upcoming activities, and supporting the shared goals of Defence Network North. #secpoint #cybersecurity #defence #security #networksecurity #defencenetworknorth
json metadata{"tags":["secpoint","cybersec","cybersecurity","defence","security","networksecurity","defencenetworknorth"],"image":["https://cdn.steemitimages.com/DQmbo9ZgSz7ZQgFJZUHcHeeArnydStrmZc5rrdoGXFCm2PV/defence_network_north_logo%20(1).jpeg"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #101375120/Trx d8f54362a488224bf55dad4eaa455781c1785d37
View Raw JSON Data
{
  "trx_id": "d8f54362a488224bf55dad4eaa455781c1785d37",
  "block": 101375120,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-12-02T22:09:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "secpoint",
      "author": "secpoint",
      "permlink": "secpoint-joins-defence-network-north-we-are-pleased-to-announce-that-secpoint-is-now-an-official-member-of-defence-network-north",
      "title": "SecPoint joins Defence Network North  We are pleased to announce that SecPoint is now an official member of Defence Network North (DNN)",
      "body": "![defence_network_north_logo (1).jpeg](https://cdn.steemitimages.com/DQmbo9ZgSz7ZQgFJZUHcHeeArnydStrmZc5rrdoGXFCm2PV/defence_network_north_logo%20(1).jpeg)\nSecPoint joins Defence Network North\n\nWe are pleased to announce that SecPoint is now an official member of Defence Network North (DNN).\n\nThis strengthens our engagement in the Danish and Nordic defence ecosystem and supports our mission to deliver advanced cyber security solutions to partners across defence, government, and critical infrastructure.\n\nDNN provides a strong community for companies that collaborate, share knowledge, and work together to enhance security across Denmark and Northern Europe. We look forward to contributing with our expertise in vulnerability scanning, protection against cyber threats, and secure infrastructure.\n\nA warm thank you to Jarl Lundin Overbeck for the invitation and introduction.\n\nWe look forward to meeting the network, joining upcoming activities, and supporting the shared goals of Defence Network North.\n\n#secpoint #cybersecurity #defence #security #networksecurity #defencenetworknorth",
      "json_metadata": "{\"tags\":[\"secpoint\",\"cybersec\",\"cybersecurity\",\"defence\",\"security\",\"networksecurity\",\"defencenetworknorth\"],\"image\":[\"https://cdn.steemitimages.com/DQmbo9ZgSz7ZQgFJZUHcHeeArnydStrmZc5rrdoGXFCm2PV/defence_network_north_logo%20(1).jpeg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}

Account Metadata

POSTING JSON METADATA
profile{"profile_image":"https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png","name":"secpoint","about":"SecPoint Cyber Security","location":"Copenhagen, Denmark","website":"https://www.secpoint.com","dtube_pub":"mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW","cover_image":"https://cdn.steemitimages.com/DQmZr1xaTSkumTuvog1Z9bChy1ZPfaxAENVfb2s485PvgaH/Banner-Facebook.jpeg","version":2}
JSON METADATA
profile{"profile_image":"https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png","name":"secpoint","about":"SecPoint Cyber Security","location":"Copenhagen, Denmark","website":"https://www.secpoint.com","dtube_pub":"mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW","cover_image":"https://cdn.steemitimages.com/DQmYh6kbrEVx2WrnhTAKJBGDYR54JMKRses989uNsZpj8Ky/COVER%20dtubesteemit2.png"}
{
  "posting_json_metadata": {
    "profile": {
      "profile_image": "https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png",
      "name": "secpoint",
      "about": "SecPoint Cyber Security",
      "location": "Copenhagen, Denmark",
      "website": "https://www.secpoint.com",
      "dtube_pub": "mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW",
      "cover_image": "https://cdn.steemitimages.com/DQmZr1xaTSkumTuvog1Z9bChy1ZPfaxAENVfb2s485PvgaH/Banner-Facebook.jpeg",
      "version": 2
    }
  },
  "json_metadata": {
    "profile": {
      "profile_image": "https://shop.secpoint.com/images/skins/Shopdeluxe/images/logo1.png",
      "name": "secpoint",
      "about": "SecPoint Cyber Security",
      "location": "Copenhagen, Denmark",
      "website": "https://www.secpoint.com",
      "dtube_pub": "mybJM8dhBht2rVYLtS2mj8sXnxXP5zwxKU5HUfya7eYW",
      "cover_image": "https://cdn.steemitimages.com/DQmYh6kbrEVx2WrnhTAKJBGDYR54JMKRses989uNsZpj8Ky/COVER%20dtubesteemit2.png"
    }
  }
}

Auth Keys

Owner
Single Signature
Public Keys
STM722dzjtn8bxMmiBwWJu2j7KanrcMdc2WZK8voFLwsoLaKQJApd1/1
Active
Single Signature
Public Keys
STM73Q7RTSGgZGftqxxoDEyTjeHcnuVwxXTsmRdrtDS678Ro6FA2r1/1
Posting
Single Signature
Public Keys
STM7itcM9pWTWPADnh2Xoe39SDqnaeuYuz9iKYiM3aDhr2tCp395X1/1
App Permissions
Memo
STM7qk6kNQy64S9rCVKrgvYzxg4VNPcvfXvx2nX7TDjBwNWAQG885
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM722dzjtn8bxMmiBwWJu2j7KanrcMdc2WZK8voFLwsoLaKQJApd",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM73Q7RTSGgZGftqxxoDEyTjeHcnuVwxXTsmRdrtDS678Ro6FA2r",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [
      [
        "dlive.app",
        1
      ]
    ],
    "key_auths": [
      [
        "STM7itcM9pWTWPADnh2Xoe39SDqnaeuYuz9iKYiM3aDhr2tCp395X",
        1
      ]
    ]
  },
  "memo": "STM7qk6kNQy64S9rCVKrgvYzxg4VNPcvfXvx2nX7TDjBwNWAQG885"
}

Witness Votes

0 / 30
No active witness votes.
[]