Author: Cybernoz

Exploring Advanced Persistent Threats and their evasive techniques
19
May
2023

Exploring Advanced Persistent Threats and their evasive techniques

Unpacking one of the most dangerous threats in cybersecurity. Cyber criminals come in all shapes and sizes. On one end…

Detectify at PHP Meetup - Detectify Blog
19
May
2023

Detectify at PHP Meetup – Detectify Blog

On May 11th, we co-organised a PHP security meetup together with PHP Stockholm at SUP46, where our knowledge advisor Frans…

InnoGames Models Avatar After Top Ethical Hacker
18
May
2023

h1-5411 Recap – Argentina! Oath Bug Bounty

For the first time, HackerOne kicked off fall by migrating south. Way south. All the way to Buenos Aires, Argentina!…

Cyberattacks on City and Municipal Governments
18
May
2023

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase…

TargetOverview
18
May
2023

[Release] New scan profile overview allows you to see progress over time

Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our…

Android malware
18
May
2023

Cybercrime gang pre-infects millions of Android devices with malware

A large cybercrime enterprise tracked as the “Lemon Group” has reportedly pre-installed malware known as ‘Guerilla’ on almost 9 million…

Juneteenth: HackerOne’s Day for Action
18
May
2023

The Best is Yet To Come: DOD Awards New Hack the Pentagon Contract to HackerOne

Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the…

Hand holding a key
18
May
2023

KeePass exploit helps retrieve cleartext master password, fix coming soon

The popular KeePass password manager is vulnerable to extracting the master password from the application’s memory, allowing attackers who compromise…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
18
May
2023

IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify?

Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method,…

Apple
18
May
2023

Apple fixes three new zero-days exploited to hack iPhones, Macs

Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware…

Apple
18
May
2023

Apple fixes three zero-days exploited to hack iPhones and Macs

Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware…

#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek
18
May
2023

Financial Services: Tips for Bug Bounty Success

In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great…