Using AI to Extract Wisdom from Any Text
Unsupervised Learning Unsupervised Learning is a Security, AI, and Meaning-focused company, newsletter & podcast that looks at how best to thrive as humans in a…
Unsupervised Learning Unsupervised Learning is a Security, AI, and Meaning-focused company, newsletter & podcast that looks at how best to thrive as humans in a…
Greetings, digital guardians. Today, we’ll be diving into the wonderful world of External Attack Surface Management (EASM) platforms. As the sun rises on another day…
A Europol report discusses developments in cyberattacks, new methodologies, and threats as observed by Europol’s operational analysts. The European Union Agency for Law Enforcement Cooperation…
AppSec teams often struggle to either validate or scale their security policies, like enforcing security headers or removing risky technologies. This job is easier said…
We’re excited to announce that Detectify has been included in the 2023 Gartner Competitive Landscape for External Attack Surface Management report. This report is an…
This week’s big news is the extortion attacks on the Caesars and MGM Las Vegas casino chains, with one having already paid the ransom and…
A sophisticated hacking group targeted cryptocurrency firms by exploiting a vulnerability in Google Authenticator. The hackers targeted Retool, a software development platform that is used…
Dariy Pankov, the NLBrute malware author, pleads guilty Pierluigi Paganini September 15, 2023 The Russian national Dariy Pankov, aka dpxaker, has pleaded guilty to conspiracy…
AppSec teams often struggle to either validate or scale their security policies, like enforcing security headers or removing risky technologies. This job is easier said…
Software company Retool says the accounts of 27 cloud customers were compromised following a targeted and multi-stage social engineering attack. Retool’s development platform is used…
Remember: There ain’t no such thing as a free lunch! KEY FINDINGS A supply chain attack on the Free Download Manager website redirected some users…
Resolving vulnerabilities quickly depends on several factors, not least how effectively security and product development teams collaborate. Modern security teams rely on several tools to…