Meet the Hacker: europa: “I always trust my gut when I get the feeling that something is there”
Meet the hacker europa, a white hat hacker on the Detectify Crowdsource platform. He is based in Italy with a great passion for infosec and…
Meet the hacker europa, a white hat hacker on the Detectify Crowdsource platform. He is based in Italy with a great passion for infosec and…
In September 2023, Google Chrome will stop showing the lock icon when a site loads over HTTPS, partly due to the now ubiquitous use of…
May 03, 2023Ravie LakshmananPrivacy / Technology Apple and Google have teamed up to work on a draft industry-wide specification that’s designed to tackle safety risks…
Apple has released the first security update under its new Rapid Security Response programme, but has sparked confusion after releasing no information about any of…
The LockBit ransomware group has claimed to have stolen data belonging to nearly 60 companies after the alleged Cloud 51 ransomware attack. While the exfiltrated…
Back in 2005, the Computer Security Resource Center (CRSC) published NIST 800-53: the “Security and Privacy Controls for Information Systems and Organizations” publication. This Special…
Following a well-publicised ransomware attack in February 2023, Häfele was able to recover in record time by moving to Cato SASE Cloud. The international manufacturer…
The Pornhub Utah VPN phenomenon is unwrapping into a new wave of outrage in the US state. What seemed like easy access to pornographic videos…
The Lawrence Family Development Charter School (LFDCS) became the latest cyber attack victim in the US education sector, with the Snatch ransomware claiming responsibility for…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from…
May 03, 2023Ravie LakshmananSurveillance / Vulnerability Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording (DVR) devices, according to an…
For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist of a globally distributed team of security analysts that triage…