NO. 362 | Dependency Scanner, Citrix Attacks, AI Analysis…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 362 |...
Read more →Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 362 |...
Read more →Some thoughts inspired by International Women’s Day, Grace Hopper, and making contributions to the world of tech. It’s International Women’s...
Read more →After a day of prep, we were ready to launch into our first day of H1-702! What makes today...
Read more →When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource...
Read more →If you follow Information Security at all you are surely aware of the LastPass breach situation. It started back in...
Read more →How to set up a cross-platform solution for working with Git on iOS. 2019-03-15 11:55:28 -0400 -0400 March 15, 2019...
Read more →Welcome back to our first day of in-person hacking! We had some lovely people greeting you today for your check-in....
Read more →It takes a crowd to secure the attack surface. Detectify collaborates with the Crowdsource ethical hacker community to power a...
Read more →Created/Updated: January 2, 2023 There’s a river of argument about ChatGPT that goes something like this: I know GPT can...
Read more →Keep your drafts out of the public eye by making use of continuous deployment tools to publish your public GitHub...
Read more →It is a new day with new challenges. Scope has shifted for the next part of our LHE. Today, you...
Read more →STOCKHOLM, SWEDEN – Detectify, the SaaS security company powered by ethical hackers, announces new product names for the core products...
Read more →