04
May
2023

Amazon Inspector allows search of its vulnerability intelligence database

Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure…

Vulnerability Disclosure is Now Mandatory for Federal Agencies - Here's How to Make it Happen
04
May
2023

Vulnerability Disclosure is Now Mandatory for Federal Agencies – Here’s How to Make it Happen

Federal agencies exist to protect and support the nation and its citizens. Despite their elaborate processes to reduce cyber risk,…

04
May
2023

Unpaid open source maintainers struggle with increased security demands

Ensuring the security of the open-source software that modern organizations depend on is a crucial responsibility of the open source…

Is EDR or MDR better for your business?
04
May
2023

Is EDR or MDR better for your business?

Be sure to catch the full webinar on Wednesday, May 10, 2023. Don’t miss our upcoming webinar on EDR vs. MDR!…

Detectify security updates for 15 November
04
May
2023

Detectify security updates for 15 November

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,…

Google Authenticator WILL get end-to-end encryption. Eventually.
04
May
2023

Google Authenticator WILL get end-to-end encryption. Eventually.

Google has promised to add end-to-end encryption to Google Authenticator backups after users were warned against turning on the new…

Google takes CryptBot to the wood shed
04
May
2023

Google takes CryptBot to the wood shed

We take a look at Google’s efforts to shut down a particularly nasty set of modified Chrome installs playing host…

H1-2010 FAQ’s | HackerOne
04
May
2023

H1-2010 FAQ’s | HackerOne

Important Links: RegistrationThe Paranoids Event OverviewThe Paranoids Event Insights Contact [email protected] for any questions! We are so excited to have you participate…

New undetectable ransomware technique uses WinRar software to encrypt and wipe data
04
May
2023

New undetectable ransomware technique uses WinRar software to encrypt and wipe data

The Ukrainian Government Computer Emergency Response Team (CERT-UA) has released a new alert in which it states that Russian hackers…

Oracle WebLogic Server vulnerability added to CISA list as “known to be exploited”
04
May
2023

Oracle WebLogic Server vulnerability added to CISA list as “known to be exploited”

An easy to exploit vulnerability in Oracle WebLogic Server has been added to the CISA list of things you really,…

Detectify security updates for 29 November
04
May
2023

Detectify security updates for 29 November

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,…

How to keep your ChatGPT conversations out of its training data
04
May
2023

How to keep your ChatGPT conversations out of its training data

OpenAI has introduced a feature that lets you opt your conversations out of ChatGPT’s training data, but you have to…