Author: Cybernoz

OWASP TOP 10: XXE - Detectify Blog
17
May
2023

OWASP TOP 10: Using Components with Known Vulnerabilities

Using components with known vulnerabilities is one of the vulnerability categories on OWASP‘s list of the ten most common vulnerabilities. A proof…

Slack Increases Bounty Minimums For the Next 90 Days
17
May
2023

Hacktivity Disclosure for Private Programs

Disclosure is in the DNA of HackerOne. We call it Hacktivity and have supported public disclosure workflows of vulnerability reports…

Cisco
17
May
2023

Cisco warns of critical switch bugs with public exploit code

Cisco warned customers today of four critical remote code execution vulnerabilities with public exploit code affecting multiple Small Business Series…

Enzoic’s identity breach monitoring solution protects accounts and data from fraud
17
May
2023

Enzoic’s identity breach monitoring solution protects accounts and data from fraud

Enzoic launched an identity monitoring offering, enabling organizations to continuously track and ensure their users’- whether its customers or employees–…

Beta feature: New and more consistent crawler
17
May
2023

[Release] New modules – Detectify Blog

Security never stands still, which is why we update our service on a regular basis to help you keep up…

Windows
17
May
2023

Microsoft pulls Defender update fixing Windows LSA Protection bug

Microsoft has pulled a recent Microsoft Defender update that was supposed to fix a known issue triggering persistent restart alerts…

The US Post Office Is Spying on the Mail. Senators Want to Stop It
17
May
2023

The US Post Office Is Spying on the Mail. Senators Want to Stop It

Each year, at the request of police and intelligence agents across the country, the United States Postal Service conducts surveillance…

Facebook Paid Blue Tick
17
May
2023

Facebook & Instagram Begun Rolling Out Paid Blue Tick

Meta is introducing Meta Verified on Facebook and Instagram. The popular social networking platform will now permit anyone who agrees…

Satori enhances its platform to help companies proactively protect data
17
May
2023

Satori enhances its platform to help companies proactively protect data

Satori has released Posture Management, a new capability within Satori’s platform that monitors the authorization of users to data across…

Camaro Dragon Hacker Group
17
May
2023

Camaro Dragon Hacker Group Attack TP-Link Routers

Recently, the cybersecurity experts at Checkpoint identified that the Chinese state-sponsored group “Camaro Dragon” employs a custom “Horse Shell” malware…

Cobalt Strike Modified to Attack macOS Users
17
May
2023

Hackers Modified Cobalt Strike Capabilities to Attack macOS Users

Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable…

What to Look For in a Penetration Testing Company
17
May
2023

Grammarly’s Bug Bounty Program Goes Public: Q&A with VP of Engineering Joe Xavier

It’s been over a year since Grammarly launched its first bug bounty program on HackerOne. It’s been a private, invite-only…