5 Articles to Get You Up-to-Speed on Bug Bounty Programs
Many organizations use bug bounty programs to help them protect their ever-expanding attack surface and achieve attack resistance. Bug bounties, with ethical hackers at the…
Many organizations use bug bounty programs to help them protect their ever-expanding attack surface and achieve attack resistance. Bug bounties, with ethical hackers at the…
ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the first time. The group behind…
The early findings of a pioneering cyber security project are showing promising signs that a novel technological approach implemented in the Arm Morello research prototype…
Detectify Crowdsource hacker Sebastian Neef, otherwise known as Gehaxelt, has an inspirational background in ethical hacking. Driven by curiosity, a sense of friendly competition, and…
A recent report from CISA (US Cybersecurity and Infrastructure Security Agency) revealed that the APT 28 group was responsible for exploiting Cisco routers with poor…
A new group of hackers, which calls itself the ‘Indian Cyber Mafia’, has allegedly launched cyberattacks on Indonesian universities. This was in retaliation to hacking…
Detectify collaborates with Crowdsource, our private network of ethical hackers to help our customers access the latest critical security research and secure their web apps.…
Websites of multiple U.S. universities are serving Fortnite and ‘gift card’ spam. Researchers observed Wiki and documentation pages being hosted by universities including Stanford, MIT, Berkeley, UMass Amherst, Northeastern, Caltech, among…
A hacker group known as ShadowHacker has claimed to have gained access to the database of freshersworld.com, a popular website for job seekers in India.…
Bookmarklets you can use in your browser to help clean up your social media data. A little while ago I wrote about a Lambda function…
A few years back, many people started creating fake twitter profiles to propagate fake news and to indulge in an other kind of online crimes.…
Android users beware: a new Android botnet called DAAM is distributed through Trojanized applications. This was recently discovered by Cyble Research & Intelligence Labs (CRIL)…