5 things we’ve done to make your Detectify experience better
1) More transparency on what tests we have performed Transparency is one of our core values at Detectify, and we want to get as far…
1) More transparency on what tests we have performed Transparency is one of our core values at Detectify, and we want to get as far…
The UK’s National Cyber Security Centre (NCSC), and the Information Commissioner’s Office (ICO), have banded together to urge those affected by cyber incidents, especially ransomware,…
Toyota Motor Corporation disclosed a data breach on its cloud environment that exposed the car-location information of 2,150,000 customers for ten years, between November 6,…
The cybersecurity researchers at Akamai recently affirmed as web applications and third-party tools become more prevalent, the risk of cyber-attacks increases due to a larger…
Researchers from Trend Micro at Black Hat Asia claim that criminals have pre-infected millions of Android devices with malicious firmware before the devices ever leave…
May 12, 2023Ravie LakshmananNetwork Security / Malware As many as five security flaws have been disclosed in Netgear RAX30 routers that could be chained to…
HM Revenue & Customs (HMRC) is being applauded for its “pragmatic” approach to conducting an 18-month IR35 compliance check on a global manufacturing business that…
Assign severity to policy breaches AppSec teams often struggle to either validate or scale their security policies, like enforcing security headers or removing risky technologies.…
May 12, 2023Ravie LakshmananLinux / Malware A previously undocumented and mostly undetected variant of a Linux backdoor called BPFDoor has been spotted in the wild,…
The Play ransomware group has leaked 5GB of pilfered data allegedly from the City of Lowell cyber attack. The official website of the City of…
It’s been two years since Upserve launched its public bug bounty program on HackerOne. During that time, Upserve’s security team has resolved over 85 valid…
In today’s interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees, secure collaboration has become increasingly vital. However, collaboration can pose…