Author: Cybernoz
Click for printable size. Here’s a quick list of things we can do to get ready for AI’s ascendance. You…
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an…
How a fun but useless project turned into a Unicode substitution cipher algorithm. Full transparency: I occasionally waste time messing…
Today’s hacker Cubed JXoaT >> What was your experience with the word hacker, or what brought you to hacking in…
Secure Service Edge works with a variety of network configurations. Is it right for yours? By Chris Alberding & Evin…
STOCKHOLM — Aug. 18, 2021 — Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with…
Created/Updated: December 12, 2022 There’s a lot of talk about how GPT is going to take over search. Meaning, compete…
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical…
I moved my site’s blog to its own domain without breaking old links or losing comments. Here’s how. I started…
Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor their accounts using…
MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software vulnerabilities, has…
At Detectify, we like to approach problems as opportunities for improvement. In the last couple of months, we’ve faced two…










