TLS 1.1 enabled


During the scan, Kayran managed to find that the web server supports encryption through TLS 1.1.
When aiming for PCI or DSS, it is recommended to use a newer version : TLS 1.3.

An attacker might be able to exploit this vulnerability to conduct MITM (Man-In-The-Middle) attacks and decrypt the traffic that takes place between the affected services and the customers.


In order to prevent this vulnerability, make sure that you disable TLS 1.1 and replace it with the newer version of TLS 1.3.
Always do your best to make sure it’s updated to the latest release.


< Return to all Vulnerabilities

Blue Team

We’ve talked about The Red Team before, but what about The Blue Team? How is this group different from the red one? Why would we

Read More »


In this article we will talk about APT vs. ATP. In other words, Advanced Persistent Threat and Advanced Threat Protection and the context between these

Read More »

The Dark Web

Let’s talk about the darker and more mysterious side of the internet, also known as The Dark Web. You’ve probably heard about it, whether it’s

Read More »

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »