Microsoft has confirmed a global outage affecting the Exchange Admin Center (EAC), leaving administrators unable to access critical management tools….
Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate…
Microsoft’s mighty bundle of 124 April fixes for Common Vulnerabilities and Exposures (CVEs) in its codebase includes 11 that are…
I think a lot about what makes people successful, both in a general sense and also on an individual basis….
External Attack Surface Management (EASM) is the continuous discovery, analysis, and monitoring of an organization’s public facing assets. A substantial…
IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things…
Phishing actors are employing a new evasion tactic called ‘Precision-Validated Phishing’ that only shows fake login forms when a user…
Adobe has released a comprehensive set of security updates addressing multiple vulnerabilities across twelve of its products. The patches, all…
North Korean threat actors have demonstrated their adept use of social engineering techniques combined with Python scripting to infiltrate secure…
Software engineering is also a high demand area, with research from the Recruitment and Employment Confederation showing that software engineers…
I’ve been reading a good bit of cheesy conspiracy theory material recently. One concept keeps coming up, though, regardless of…
Early each year, Detectify honors the top-performing ethical hackers within our Crowdsource community. To do so, we’ve put together our…










