Log4Shell: Attack Evolution | HackerOne
For many security teams, the holiday season was spoiled by the challenging remediation of Log4Shell. The affected Log4j software is...
Read more →For many security teams, the holiday season was spoiled by the challenging remediation of Log4Shell. The affected Log4j software is...
Read more →Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more...
Read more →Google refuses to invest in solid product strategy and UI/UX, and the results are becoming predictable Created/Updated: October 2, 2022...
Read more →Matt Atkinson | 25 April 2023 at 14:06 UTC More than 1,000 organizations are using Burp Suite Enterprise Edition to...
Read more →Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security strategies...
Read more →NEW RESEARCH – On December 30, Fredrik Nordberg Almroth, security researcher and co-founder of Detectify – the Sweden-born cybersecurity company...
Read more →I’ve been thinking a lot about meritocracy lately, and I’ve come to believe that opportunity magnifies inequality. Here’s one way...
Read more →Maintaining the security of the digital assets within the Defense Industrial Base (DIB) contractor networks helps defend the United States...
Read more →TL;DR: On January 7, the Detectify security research team found that the .cd top-level domain (TLD) was about to be released for...
Read more →One of the most challenging parts of finishing a post is coming up with a good image. The AI art...
Read more →Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today than yesterday....
Read more →Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more...
Read more →