[tl;dr sec] #306 – Claude Code’s Hacking Campaign, Rust in Android, Secrets Scanners Miss
I hope you’ve been doing well! I’m stoked to announce I’ll be doing a webinar with my friend Daniel Miessler on his epic AI setup.…
I hope you’ve been doing well! I’m stoked to announce I’ll be doing a webinar with my friend Daniel Miessler on his epic AI setup.…
Holm Security Pros Covers the entire IT estate, including internal network, cloud, web, and human risk, simplifying vendor consolidation. It leverages a unified risk score…
We’re excited to introduce Asset Groups, our latest feature designed to help structure mismanaged and broad program scopes for improved visibility. A more organized program…
The evolution of the internet and, with it, international levels of e-commerce, meant that Black Friday soon became the unofficial start of winter purchases ahead of holiday festivities across the globe. In the early 2000s, Cyber Monday, held on…
We are thrilled to announce that Intigriti has won Security Innovation of the Year at the UK IT Industry Awards 2025. The UK IT Industry…
Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting,…
Amelia Coen | 14 November 2025 at 15:09 UTC AI isn’t just reshaping cybersecurity – it’s challenging testers to rethink their entire playbook. In his…
Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting,…
Halo Security Pros It consolidates EASM, infrastructure scanning, and manual penetration testing services into a single platform, simplifying vendor management. Its deep cloud-provider integrations (AWS,…
Over the past few years, API security has gone from a relatively niche concern to a headline issue. A slew of high-profile breaches and compliance…
We frequently hear that we have a data scarcity problem in AI. And when it comes to unique, Tolstoy-level literature and the like, that could…
Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more…