Improve your Magento security – check your site for Magento security issues
Test your Magento site for over 500 vulnerabilities If you’re running an e-commerce store, keeping your customers’ data safe is a priority. Detectify is an…
Test your Magento site for over 500 vulnerabilities If you’re running an e-commerce store, keeping your customers’ data safe is a priority. Detectify is an…
A new ‘White Phoenix’ ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption. Intermittent encryption is a strategy…
WhatsApp has become one of the most widely used platforms for communication among all age groups. With the growing use of this communication platform, cybercriminals…
Elon Musk issued a statement recently slamming WhatsApp for secretly recording activities while the user is sleeping. On Tuesday, the Tesla Chief raised concerns that…
Trua launched a new product called TruaID, which will give consumers a greater sense of security with their private information while providing businesses a more…
The Phishing-as-a-Service (PhaaS) platform named ‘Greatness’ has seen a spike in activity as it targets organizations using Microsoft 365 in the United States, Canada, the…
May 10, 2023Ravie LakshmananVulnerability / Windows Cybersecurity researchers have shared details about a now-patched security flaw in Windows MSHTML platform that could be abused to…
As our customers’ security teams grow, it’s important for us to sustain their growth with new features. Today we’re announcing the Program Audit Log. It…
One of the biggest security threats is password cracking. Are you an IT system administrator concerned about the security of your organization’s data? In this…
Detectify Crowdsource is our crowdsourced security initiative that allows us to implement white-hat hacker knowledge into our service and work with 100+ of the world’s…
What has firmware got to do with pop rock, you ask? That’s the question that crossed a security researcher’s mind as he analyzed Kingston’s firmware and…
May 10, 2023Ravie LakshmananMalware / Cyber Attack Government organizations in Central Asia are the target of a sophisticated espionage campaign that leverages a previously undocumented…