Top 13 SaaS Cybersecurity Threats in 2023
29
Apr
2023

Top 13 SaaS Cybersecurity Threats in 2023

Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be…

How HackerOne Positively Influences Zebra’s Software Development Life Cycle
29
Apr
2023

How HackerOne Positively Influences Zebra’s Software Development Life Cycle

HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug…

The Tragic Fallout From a School District’s Ransomware Breach
29
Apr
2023

The Tragic Fallout From a School District’s Ransomware Breach

Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC…

Detectify secures 21.5 million EUR with Balderton
29
Apr
2023

Detectify secures €21,5 million in Series B round to bring world-class cyber security to everyone

Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture…

Hackers selling macOS Stealer
29
Apr
2023

Hackers are Selling a new Atomic macOS (AMOS) Stealer

Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was…

How to Remove Your Personal Info From Google's Search Results
29
Apr
2023

How to Remove Your Personal Info From Google’s Search Results

Last year, Google expanded the ways you can submit removal requests for search results containing personal info. Before this change, people…

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows
29
Apr
2023

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

 Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to…

Detectify year in review 2019
29
Apr
2023

Detectify year in review 2019

Detectify year in review: 2019 has been quite a journey so far with expansion to the US and doubling our…

What is Keylogger? How it Works?
29
Apr
2023

What is Keylogger? How it Works?

Keylogger is a malicious computer program that records everything you type on the keyboard, learns the keystroke pattern, including words,…

What Are Bug Bounties? How Do They Work? [With Examples]
29
Apr
2023

What Are Bug Bounties? How Do They Work? [With Examples]

How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…

Guest blog: streaak - my recon techniques from 2019
29
Apr
2023

Guest blog: streaak – my recon techniques from 2019

Detectify Crowdsource hacker Akhil George, aka streaak, is a full-time student who chases bug bounties during his free time. His…

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action
29
Apr
2023

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into…