Author: Cybernoz
While all the major Silicon Valley social media firms—from Instagram to TikTok—say they block children from using their apps, these…
What Does the Rise of Cloud Mean? According to Bressers, “It was easy to believe that your systems were secure in…
The open-source e-commerce platform PrestaShop has released a new version that addresses a critical-severity vulnerability allowing any back-office user to…
On October 29th, Detectify released a security test to detect a critical Oracle WebLogic Server RCE – CVE-2020-14882. Again in…
Cisco disclosed today a zero-day vulnerability in the company’s Prime Collaboration Deployment (PCD) software that can be exploited for cross-site…
A Chinese APT hacking group known as ‘Evasive Panda’ is linked to a mysterious attack that distributed the MsgBot malware as…
By , VP of Human Resources and Talent Acquisition, Currently there are , yet there are still upwards of 700,000…
At HackerOne’s 2021 Security@ conference, we spoke with Douglas Day, an experienced ethical hacker and senior product security engineer who…
Microsoft has fixed a known issue triggering Windows Security warnings that Local Security Authority (LSA) Protection is off by removing…
Johan Svensson joined Detectify as an intern in March 2017, and was hired full-time in October that same year. Now…
Google is taking down malware infrastructure linked to the Cryptbot info stealer after suing those using it to infect Google Chrome users…
Apr 26, 2023Ravie LakshmananLinux / Cyber Threat The Chinese nation-state group dubbed Alloy Taurus is using a Linux variant of…