Microsoft Exchange Admin Center Down Globally
09
Apr
2025

Microsoft Exchange Admin Center Down Globally

Microsoft has confirmed a global outage affecting the Exchange Admin Center (EAC), leaving administrators unable to access critical management tools….

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA
09
Apr
2025

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate…

Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs
09
Apr
2025

Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs

Microsoft’s mighty bundle of 124 April fixes for Common Vulnerabilities and Exposures (CVEs) in its codebase includes 11 that are…

Hacking and Grinding: The Balance Between Passion and Self Control
09
Apr
2025

Hacking and Grinding: The Balance Between Passion and Self Control

I think a lot about what makes people successful, both in a general sense and also on an individual basis….

Subdomain reconnaissance: enhancing a hacker's EASM
09
Apr
2025

Subdomain reconnaissance: enhancing a hacker’s EASM

External Attack Surface Management (EASM) is the continuous discovery, analysis, and monitoring of an organization’s public facing assets. A substantial…

Camilo Gutiérrez Amaya
09
Apr
2025

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things…

Phishing
09
Apr
2025

Phishing kits now vet victims in real-time before stealing credentials

Phishing actors are employing a new evasion tactic called  ‘Precision-Validated Phishing’ that only shows fake login forms when a user…

Adobe Security Update - Patch for Multiple Vulnerabilities Across Products
09
Apr
2025

Adobe Security Update – Patch for Multiple Vulnerabilities Across Products

Adobe has released a comprehensive set of security updates addressing multiple vulnerabilities across twelve of its products.  The patches, all…

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands
09
Apr
2025

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with Python scripting to infiltrate secure…

Ultimate guide to becoming a software engineer
09
Apr
2025

Ultimate guide to becoming a software engineer

Software engineering is also a high demand area, with research from the Recruitment and Employment Confederation showing that software engineers…

Power Structures Use Diversions to Maintain Control
09
Apr
2025

Power Structures Use Diversions to Maintain Control

I’ve been reading a good bit of cheesy conspiracy theory material recently. One concept keeps coming up, though, regardless of…

2022 Detectify Crowdsource Awards: Meet the winners
09
Apr
2025

2022 Detectify Crowdsource Awards: Meet the winners

Early each year, Detectify honors the top-performing ethical hackers within our Crowdsource community. To do so, we’ve put together our…