Author: Cybernoz

WordPress Security - Detectify Blog
20
May
2023

How To Improve Your WordPress Security

WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and…

H1-702 CTF Winners Announced! | HackerOne
20
May
2023

H1-702 CTF Winners Announced! | HackerOne

Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first time ever, we had both…

A TikTok ‘Car Theft’ Challenge Is Costing Hyundai $200 Million
20
May
2023

A TikTok ‘Car Theft’ Challenge Is Costing Hyundai $200 Million

But wait, there’s more. Each week we round up the security stories we didn’t cover in depth ourselves. Click on…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White…

npm
20
May
2023

npm packages hide TurkoRAT malware in what looks like a NodeJS EXE

Researchers have discovered multiple npm packages named after NodeJS libraries that even pack a Windows executable that resembles NodeJS but instead…

Keeper Password Vulnerability
20
May
2023

SIM Swapping Technique to Gain Access to Azure Machines

Researchers uncovered a financially motivated threat group known as ‘UNC3944’ which employs phishing and SIM-swapping techniques to seize control of…

Meet 'Jack' from Romania! Mastermind Behind Golden Chickens Malware
20
May
2023

Meet ‘Jack’ from Romania! Mastermind Behind Golden Chickens Malware

The identity of the second threat actor behind the Golden Chickens malware has been uncovered courtesy of a fatal operational…

There is no room for racism or inequality here.
20
May
2023

The Hacker-Powered Security Report 2018

“Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers is expected to be rapid…”…

WordPress Security - Detectify Blog
20
May
2023

How to Improve Your WordPress Security: Plugins and Themes

A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be…

The Underground History of Turla, Russia's Most Ingenious Hacker Group
20
May
2023

The Underground History of Turla, Russia’s Most Ingenious Hacker Group

Ask Western cybersecurity intelligence analysts who their “favorite” group of foreign state-sponsored hackers is—the adversary they can’t help but grudgingly…

GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne
20
May
2023

Zomato’s First Anniversary with Bug Bounties: Q&A with Security Lead, Prateek Tiwari

Headquartered in India – restaurant discovery, online ordering and table reservations platform Zomato currently operates in 24 countries; including the…

WordPress Security - Detectify Blog
20
May
2023

WordPress Security – Detectify Blog

WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most…