Author: Cybernoz

Android Phones Pre-Infected Malware
14
May
2023

A Malware Attack Pattern to Infect Devices

Recently, it has been observed by JPCERT/CC that threat actors are actively targeting the cryptocurrency exchanges linked to the DangerousPassword…

14
May
2023

Week in review: Microsoft fixes two actively exploited bugs, MSI private code signing keys leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Dragos blocks ransomware attack, brushes…

Dating Apps And Sites: Mitigating Chargebacks In 2023
14
May
2023

Securing SCADA Networks In Power Distribution Sector

By Prashant Diwakar Securing SCADA networks in the power distribution sector is crucial to ensure the safe and reliable operation…

Dating Apps And Sites: Mitigating Chargebacks In 2023
14
May
2023

Email Authentication Crucial To Remedying Non-profits’ Vulnerability

by Gerasim Hovhannisyan, CEO and co-founder, EasyDMARC Charities are lifelines for the most vulnerable people in society. They have proved…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
14
May
2023

See Your Success In Real Time with the new Program Dashboard

We’ve revamped the Program Dashboard to help you better understand the value that hacker-powered security is bringing to your company….

Todd Troutman, Qualpay: "Detectify is the magic combination of simple and powerful"
14
May
2023

Todd Troutman, Qualpay: “Detectify is the magic combination of simple and powerful”

Qualpay is a payment processing platform that allows merchants to focus on their business. Todd Troutman, Senior Systems Engineer at…

10 Ways to Hack Your “New Normal” Workweek
14
May
2023

Taking The Guesswork Out of Vulnerability Reporting

In today’s world, the majority of security vulnerabilities are introduced by software engineers. To build the most secure code, we…

Detectify's Martina Janevska on stage at Swetugg 2017
14
May
2023

Detectify’s Martina Janevska on stage at Swetugg 2017

Yesterday, the Swetugg conference in Stockholm, Sweden, gathered hundreds of developers for a full day of talks and best practices….

HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution
14
May
2023

Automate Workflows with Enhanced Jira Integration

Integrating with Jira has always been an important piece of integrating HackerOne into the SDLC of our customers. HackerOne’s bi-directional…

Meet the team: Andrea Palaia - From particle physics at CERN to Detectify data
14
May
2023

Meet the team: Andrea Palaia – From particle physics at CERN to Detectify data

Team Data at Detectify is a one-man show ran by our Data Scientist Andrea Palaia. After completing his PhD in…

h1-415 CTF Winners Announced! | HackerOne
14
May
2023

Grand Rounds VP InfoSec: Achieving SOC 2 Type II Compliance with Hacker-Powered Security

Grand Rounds is a new kind of healthcare company that makes it easy for people to get access to high-quality…

The Danger of Third Party Scripts
13
May
2023

The Danger of Third Party Scripts

Our security researcher Linus Särud explains why you need to realize that a vulnerability in an imported resource is as…