Category: Mix
Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the…
Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method,…
In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great…
Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the…
Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….
Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…
Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the…
TL;DR, Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a…
George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing…
There is a lot think about when it comes to security, but what is the one most important piece of advice…
Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard,…
Our next update is here! Two weeks ago we released the new scan profile overview to make it easier for…










![[Release] New dashboard, navigation and better support for unlimited scan profiles Detectify Navigation](https://image.cybernoz.com/wp-content/uploads/2023/05/Release-New-dashboard-navigation-and-better-support-for-unlimited-scan-360x270.png)