Author: Cybernoz

Detectify's ISO 27001 certification use case and guide for SaaS companies
25
Apr
2023

Detectify’s ISO 27001 certification use case and guide for SaaS companies

An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A…

Mossad cyber attack
25
Apr
2023

Anonymous Sudan Targets Israel Intelligence Agency

Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of…

Cyber Attack news headlines trending on Google
25
Apr
2023

Cyber Attack news headlines trending on Google

Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News…

25
Apr
2023

AI tools help attackers develop sophisticated phishing campaigns

Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,…

Donating Bounties to Humanitarian Efforts in Ukraine
25
Apr
2023

Donating Bounties to Humanitarian Efforts in Ukraine

In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes….

Microsoft Taxonomy
25
Apr
2023

Microsoft Changed the Taxonomy of Naming the Hacker groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…

25
Apr
2023

The silent killers in digital healthcare

As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…

Google Authenticator
25
Apr
2023

Google Authenticator App Gets Cloud Backup Feature for TOTP Codes

Apr 25, 2023Ravie LakshmananPassword Security / Authentication Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator…

25
Apr
2023

LockBit Hiring: Releases Post For Testers

One of the most malicious cybercriminal groups LockBit, was found sharing a recruitment post on its website on the dark…

Security Defender Insights from Roberto Adrias, Quandoo
25
Apr
2023

Security Defender Insights: “bad actors are using intelligence and automatic tools, we need to surpass those abilities”

In this new series, Security Defender Insights, Detectify is recognizing Security Defenders in our network to bring you actionable insights…

25
Apr
2023

The double-edged sword of open-source software

The lack of visibility into the software supply chain creates an unsustainable cycle of discovering vulnerabilities and weaknesses in software…

25
Apr
2023

Rethinking the effectiveness of current authentication initiatives

As user credentials continue to be a top vector for cyberattacks, organizations are under tremendous pressure to rethink the effectiveness…