2020
In the course of work, we cover all possible environments to simulate potential attack vectors, created by hackers.