SAP Debugger’s Power and Danger
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol…
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
A significant vulnerability has been discovered in Foxit PDF Reader, a well-liked alternative to the PDF software developed by Adobe. The JavaScript interface that is…
May 12, 2023Ravie LakshmananCyber Threat / Malware Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a unique attack chain to deliver…
Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions, innovative presentations, and record-breaking live…
This week we have multiple reports of new ransomware families targeting the enterprise, named Cactus and Akira, both increasingly active as they target the enterprise.…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
Automation transforms the audit experience. What was once a burden to bear becomes a competitive advantage that lets your company maximize every opportunity. Streamlining the…
Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat down with Laurie Mercer, a…
Johan Edholm is one of the founders of Detectify and a well-established profile in the Swedish IT security community. With his strong presence on online…
Discord is notifying users of a data breach that occurred after the account of a third-party support agent was compromised. The security breach exposed the…
Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to find vulnerabilities before criminals…