by Monica Eaton, Founder of Chargebacks911 and Fi911. Chief Information Officer of Global Risk Technologies. The way many people find…
What are Penetration Tests? Penetration testing is one of the most widely used techniques for complying with security regulations and…
We have recently released Out-of-band Exploitation Support, a new feature that will improve test coverage, the quality of scan results,…
Satnam Narang, Senior Staff Research Engineer, Security Response, Tenable, recently sat down with The Cyber Express to discuss the future…
June is widely recognized as Pride month –an important moment to pause, celebrate, and support our community, employees and friends…
Detectify works with ethical hackers to help put security knowledge into the hands of those who need it most, and…
May 06, 2023Ravie Lakshmanan Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following…
Politically motivate group NoName added French government websites to its victim list. The group enlisted the National Center for Space…
Congratulations to @mayonaise, the ninth hacker to earn $1 Million hacking for good on the HackerOne platform! Over the past…
White-hat hackers are experts at discovering vulnerabilities and they want to help you improve your security. You may never be…
We take a look at one newspaper’s innovative way of bypassing Russian media restrictions. A Finnish newspaper is making clever…
After announcing Rapid Security Response (RSR) last year, Apple has finally released the first RSR patches to the public. On…