InnoGames Models Avatar After Top Ethical Hacker
InnoGames is among gaming brands like Nintendo and Riot Games taking a proactive approach to protecting its assets, inviting trusted hackers to identify potential security…
InnoGames is among gaming brands like Nintendo and Riot Games taking a proactive approach to protecting its assets, inviting trusted hackers to identify potential security…
Reports from Western Digital stated that they had a network security incident on March 26, 2023, in which an unauthorized group gained access to their…
Quick update from the security team at Detectify! We have added two new security tests to our service, checking for vulnerabilities in EpiServer and Express. …
May 09, 2023Ravie LakshmananCyber Espionage / Vulnerability Iranian nation-state groups have now joined financially motivated actors in actively exploiting a critical flaw in PaperCut print…
The legislative committee formed to investigate the Suffolk County ransomware attack will use its subpoena powers for the first time. To get the witnesses talking,…
With increased data breaches, errors, ransomware and hacks, digital trust can be the difference between retaining reputations and customer loyalty after a major incident and…
Hello hackers! Thanks to all of you who participated in our #h1415 CTF! We had a lot of fun building it, and it looks like…
Md. Ishrat Shahriyar is a 25-year old ethical hacker and Computer Science graduate from Bangladesh whose Crowdsource submissions put him at the top of the…
Iranian hacker group ‘Mint Sandstorm’ is retaliating against recent attacks on its infrastructure by targeting critical US infrastructure, as recently discovered by cybersecurity researchers at…
When I first started mobile hacking, it felt a lot like the wild west. There were very few public resources, blog posts, tools,…
May 09, 2023Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage…
The ransomware attack on the City of Oakland evoked several discussions, from the lax security of public administration bodies to the need of ransom negotiation.…