Author: Cybernoz
An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A…
Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of…
Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News…
Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,…
In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes….
Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…
As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…
Apr 25, 2023Ravie LakshmananPassword Security / Authentication Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator…
One of the most malicious cybercriminal groups LockBit, was found sharing a recruitment post on its website on the dark…
In this new series, Security Defender Insights, Detectify is recognizing Security Defenders in our network to bring you actionable insights…
The lack of visibility into the software supply chain creates an unsustainable cycle of discovering vulnerabilities and weaknesses in software…
As user credentials continue to be a top vector for cyberattacks, organizations are under tremendous pressure to rethink the effectiveness…