Bug Bounty and Automation make a formidable pair together
05
May
2023

Bug Bounty and Automation make a formidable pair together

It takes more than one security tool to keep an organization or web applications secure against vulnerabilities. Bug bounty programs…

New Weaponized Android Apps With 1M Installs Steals 2FA Codes & Passwords - GBHackers - Latest Cyber Security News
05
May
2023

New Weaponized Android Apps With 1M Installs Steals 2FA Codes & Passwords – GBHackers – Latest Cyber Security News

Check Point Research has recently published a study revealing the discovery of a previously unknown malware variant dubbed FluHorse. The…

05
May
2023

Organizations brace for cyber attacks despite improved preparedness

Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global…

The one and only password tip you need
05
May
2023

The one and only password tip you need

I was asked to write a list of password tips. It’s a short list. OK, it’s time for me to…

Securing video streaming in sub-Saharan Africa
05
May
2023

Securing video streaming in sub-Saharan Africa

Guest post by Jan Spitalnik, CTO of subscription video on demand service, Showmax Maintaining a video streaming service across the…

$10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security
05
May
2023

$10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security

The U.S. government this week put a $10 million bounty on the head of a Russian man who for the…

World Password Day must die
05
May
2023

World Password Day must die

The continued existence of World Password Day is a tell that something has gone badly wrong in cybersecurity. Now in…

Detectify security updates for 20 September
05
May
2023

Detectify security updates for 20 September

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,…

How small businesses can secure employees' mobile devices
05
May
2023

How small businesses can secure employees’ mobile devices

A third of organizations aren’t protecting their mobile devices at all. Don’t be one of them. Fact: 77% of organizations…

AI-powered content farms start clogging search results with ad-stuffed spam
05
May
2023

AI-powered content farms start clogging search results with ad-stuffed spam

We take a look at the potential issues surrounding AI-generated content produced on a mass scale. A recent study by…

Human vs. Machine: Three-Part Virtual Series on the Human Element of AppSec
05
May
2023

Human vs. Machine: Three-Part Virtual Series on the Human Element of AppSec

In 2011, when IBM’s Watson supercomputer went up against ‘Jeopardy’ icon Ken Jennings, the world watched as a battle of…

Detectify backend developer Roberto
04
May
2023

Meet the team with Roberto Giachetta: a teaching developer

“They asked if I wanted to be a teaching assistant and I thought bring it on,” Roberto Giachetta reminisces on…