IT Sec FAQ – Detectify Blog
We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why we came up with our…
We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why we came up with our…
Recent events have revealed the existence of a widespread cybercriminal group going by the name “Lemon Group,” which is responsible for the widespread distribution of…
By Aaron Sandeen, CEO and co-founder at Since June 2021, Hive Ransomware has been dominating the ransomware scene. Their reach has affected more than resulting…
So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one survey have cloud initiatives underway.…
The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Their mission is to make…
In the ever-shifting ransomware landscape, we saw new ransomware gangs emerge, threat actors return from a long absence, operations shifting extortion tactics, and a flurry…
At the time of writing, the ChatGPT app was only available in the United States. However, users from other regions should expect the app’s availability…
Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations of all shapes and sizes must first open a channel…
Update: Broken Authentication has moved down the list to position #7 because it seems to be less of an issue due to increasing adoption of…
CISA warned today of a security vulnerability affecting Samsung devices used in attacks to bypass Android address space layout randomization (ASLR) protection. ASLR is an…
19 May May 2023 Cybersecurity Business Report Posted at 14:01h in Blogs, Videos by Di Freeze Acquisitions, venture capital, and AI paint a picture of…
In August 2016, a small group of HackerOne staff brought to life the first ever live hacking event in HackerOne’s history at DEF CON 24…