Author: Cybernoz

It is illegal to use undetectable spying devices on partners
28
Apr
2023

It is illegal to use undetectable spying devices on partners

Using undetectable spying devices on partners can be illegal, and it can lead to serious legal consequences. In many countries,…

Vulnerability Testing | Best Techniques for Assessing Risks
28
Apr
2023

Vulnerability Testing | Best Techniques for Assessing Risks

What Is Vulnerability Testing? Vulnerability testing, also known as vulnerability assessment, evaluates an entire system to look for security weaknesses…

CryptBot Infrastructure
28
Apr
2023

Google Dismantles CryptBot Info-stealing Malware Infrastructure

Google uses Cryptbot info stealer for infecting Chrome users and stealing data, taking down associated malware infrastructure. The sole goal…

28
Apr
2023

Password reset woes could cost FTSE 100 companies $156 million each month

Password resets could unnecessarily cost FTSE 100 businesses over $156 million every month, according to MyCena Security Solutions. This raises…

Common security misconfigurations and remediations
28
Apr
2023

Common security misconfigurations and remediations

A misconfiguration is exactly what it sounds like; something that is wrongly configured. From a security perspective this can be…

28
Apr
2023

The double-edged sword of generative AI

Generative AI has captured the imagination of millions worldwide, largely driven by the recent success of ChatGPT, the text-generation chatbot….

Silicon Valley Startup, Stack Identity Receives $4 Million To Detect Shadow Access In Cloud
28
Apr
2023

Silicon Valley Startup, Stack Identity Receives $4 Million To Detect Shadow Access In Cloud

Stack Identity, a software company that offers solutions to automate identity and access management (IAM) raised $4 million to detect…

28
Apr
2023

New infosec products of the week: April 28, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, Arista Networks, Cyera,Eclypsium,…

Time to Issue Your Own Cyber Executive Order
28
Apr
2023

Time to Issue Your Own Cyber Executive Order

Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more…

Git Project Security Vulnerabilities
28
Apr
2023

Git Project Flaws Let Attackers Execute Arbitrary Code

A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to…

28
Apr
2023

Phishing-resistant MFA shapes the future of authentication forms

Over the last two years, respondents reported a continued reliance on the least secure forms of authentication, including traditional usernames…

Detectify security updates for 13 July
28
Apr
2023

Detectify security updates for 13 July

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…