Author: Cybernoz

Subdomain reconnaissance: enhancing a hacker's EASM
09
Apr
2025

Subdomain reconnaissance: enhancing a hacker’s EASM

External Attack Surface Management (EASM) is the continuous discovery, analysis, and monitoring of an organization’s public facing assets. A substantial…

Camilo Gutiérrez Amaya
09
Apr
2025

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things…

Phishing
09
Apr
2025

Phishing kits now vet victims in real-time before stealing credentials

Phishing actors are employing a new evasion tactic called  ‘Precision-Validated Phishing’ that only shows fake login forms when a user…

Adobe Security Update - Patch for Multiple Vulnerabilities Across Products
09
Apr
2025

Adobe Security Update – Patch for Multiple Vulnerabilities Across Products

Adobe has released a comprehensive set of security updates addressing multiple vulnerabilities across twelve of its products.  The patches, all…

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands
09
Apr
2025

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with Python scripting to infiltrate secure…

Ultimate guide to becoming a software engineer
09
Apr
2025

Ultimate guide to becoming a software engineer

Software engineering is also a high demand area, with research from the Recruitment and Employment Confederation showing that software engineers…

Power Structures Use Diversions to Maintain Control
09
Apr
2025

Power Structures Use Diversions to Maintain Control

I’ve been reading a good bit of cheesy conspiracy theory material recently. One concept keeps coming up, though, regardless of…

2022 Detectify Crowdsource Awards: Meet the winners
09
Apr
2025

2022 Detectify Crowdsource Awards: Meet the winners

Early each year, Detectify honors the top-performing ethical hackers within our Crowdsource community. To do so, we’ve put together our…

Treasury Department bank regulator discloses major hack
09
Apr
2025

Treasury Department bank regulator discloses major hack

Attackers gained access to emails containing sensitive government data related to financial institutions in a cyberattack on the Department of…

Treasury bureau notifies Congress that email hack was a ‘major’ cybersecurity incident
09
Apr
2025

Treasury bureau notifies Congress that email hack was a ‘major’ cybersecurity incident

The Office of the Comptroller of the Currency has notified Congress that a February breach of its email system is…

Specops vishing
09
Apr
2025

Who’s calling? The threat of AI-powered vishing attacks

Imagine receiving a call from a high-ranking official, urgently requesting a wire transfer to resolve a national crisis. This was…

Windows Active Directory Domain Vulnerability Let Attackers Escalate Privileges
09
Apr
2025

Windows Active Directory Domain Vulnerability Let Attackers Escalate Privileges

Microsoft has disclosed a significant security vulnerability in Active Directory Domain Services that could allow attackers to elevate their privileges…