Leaked Babuk ransomware builder code lives on as RA Group
We take a look at yet another ransomware group making use of leaked Babuk code. The bones of long gone ransomware group Babuk continue to…
We take a look at yet another ransomware group making use of leaked Babuk code. The bones of long gone ransomware group Babuk continue to…
Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update and simplify data protection routines…
By Aaron Sandeen, CEO and co-founder at In 2023, you can divide organizations into two categories: those who have been hit by a ransomware attack…
Earlier this year we introduced Hacker Email Aliases which enables you to secure set up accounts for hackers inside your program, but to make it…
Visual Studio Code, more often known by its acronym VSCode, is a source code editor that was created by Microsoft and is available for free.…
Automation should be for everyone, which is why we at Detectify love Zapier. We wanted to make it possible for our customers to use Detectify…
Image: Bing Create A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of demanding a ransom payment, the…
It’s the largest online photo management and sharing application in the world, so chances are you may have heard of it. Flickr has been running…
Back in 2015, a study from Syracuse University analysed how grouping video games into genres can be limited. Since then, the industry has expanded exponentially,…
Using components with known vulnerabilities is one of the vulnerability categories on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video follows this…
Disclosure is in the DNA of HackerOne. We call it Hacktivity and have supported public disclosure workflows of vulnerability reports since the beginning. Default to…
Cisco warned customers today of four critical remote code execution vulnerabilities with public exploit code affecting multiple Small Business Series Switches. All four security flaws…