#page-container{overflow-x:hidden!important}#h-search .dipl_ajax_search_results{max-height:450px!important}.card .dipl_image_card_image_wrapper img{width:35px;margin-left:20px;margin-top:20px}.card .dipl_image_card_carousel_item{border-radius:15px;height:280px!important}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul{width:900px!important;left:-455px;columns:2;border-radius:10px;background-size:100% 100%;background-image:url(/wp-content/uploads/2025/08/S6-1.webp)!important;border-top:none;box-shadow:0px 2px 18px 0px rgba(255,255,255,.05);padding-top:40px;padding-right:40px}.et_pb_menu_0_tb_header.et_pb_menu .nav li.company ul,.et_pb_menu_0_tb_header.et_pb_menu .nav li ul{border-radius:10px;background-size:100% 100%;background-image:url(/wp-content/uploads/2025/08/S6-1.webp)!important;border-top:none;box-shadow:0px 2px 18px 0px rgba(255,255,255,.05)}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul:before,.et_pb_menu_0_tb_header.et_pb_menu .nav li.company ul:before,.et_pb_menu_0_tb_header.et_pb_menu .nav li ul:before{content:'';width:100%;height:100%;background:#00000090;position:absolute;top:0;left:0;border-radius:10px}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li,.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li a{width:100%!important;font-size:17px}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li{padding-bottom:40px;position:relative!important}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li:before{content:'';font-family:'IBM Plex Sans',Helvetica,Arial,Lucida,sans-serif;letter-spacing:1px;font-size:14px;color:#eee;position:absolute;top:40px;left:40px;line-height:20px}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.ad:before{content:'Test Your Defenses Against Real-World Attack Scenarios.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.al:before{content:'Secure Your AI Systems Today.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.app:before{content:'Expose Weaknesses in Your Most Complex Assets.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.con:before{content:'New vulnerabilities emerge. Systems change. Attackers only need one overlooked gap to break in.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.net:before{content:'Built to Perform, Ready to Evolve.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.pass:before{content:'Beyond Password Cracking: Uncovering Hidden Credential Vulnerabilities.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.pen:before{content:'Continuous Defense, Powered by Experts.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.tech:before{content:'Security isn’t just about checking boxes. It’s about proving you’re ready.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li.services-menu ul li.techs:before{content:'Smarter IT That Never Stands Still.'}.et_pb_menu_0_tb_header.et_pb_menu .nav li ul.sub-menu li:hover a{color:#F58220!important}