Author: Cybernoz
Bot attacks were previously seen as relatively inconsequential type of online fraud, and that mentality has persisted even as threat…
This week HackerOne hosted a series of webinars that asked participants about how they rated their level of vulnerability management…
Companies’ operating models today are significantly more complex than they were just a couple of years ago, according to BeyondTrust….
(L-R) UTS vice-chancellor and president Professor Andrew Parfitt, Victor Dominello and UNSW Vice-Chancellor and President Professor Attila Brungs. Photo credit:…
As companies compete with how fast new features and products can be released on the digital market, a byproduct of…
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Arista Networks, Armorblox,…
Server-side request forgery (or SSRF) vulnerabilities can lead to total system compromise and allow access to an organization’s internal or…
HTTP Response Splitting is a type of attack that occurs when an attacker can manipulate the response headers that will…
According to the New York Times, Microsoft says the state-backed Russian hacker group Nobelium—the same actor behind the 2020 SolarWinds…
Xavier Blasco (a.k.a Lerhan) is a 23-year old security researcher on the Detectify Crowdsource Platform. He’s passionate about security and…
Last week, HackerOne joined WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. Both existing organizations…
We have written about Content Security Policy (CSP) on Detectify Labs before. But maybe you’re wondering why should you have…