Sumo Logic Penetration Testing Case Study
Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management and analytics company Sumo Logic are choosing transparency. Subject to…
Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management and analytics company Sumo Logic are choosing transparency. Subject to…
May 20, 2023Ravie LakshmananCyber Crime / Ransomware The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the threat…
Days after the City of Dallas ransomware attack, the Royal ransomware group has threatened to release the personal information of thousands of city administration employees,…
Update: Based on the OWASP Top 10 2021 proposed, injection now welcomes Cross-site Scripting (XSS) into the group. It’s no longer top of the OWASP…
With the unprecedented growth and user base of ChatGPT comes the security concern associated with the chatbot. Hackers have been attacking and leaking account credentials…
In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union think tank, initiated a task force to define guidelines around software…
Want to offer your clients security and help them make their services safer with Detectify? That’s fantastic! Security is becoming increasingly important for businesses…
May 20, 2023Ravie LakshmananMobile Security / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a medium-severity flaw affecting…
Starting today, all existing and new hackers get a personalized email alias tied to their account, in the form of username[at]wearehackerone[dot]com. Any emails sent to…
A CMS is a Content Management System used to create, manage and organize content on a web sites or web services. One of the most…
KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to extract the master password from…
This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally published on Oath.com. A little more than three months ago, we…