Detectify security updates for 13 July
28
Apr
2023

Detectify security updates for 13 July

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…

28
Apr
2023

5G surpasses expectations, becomes a global game-changer

5G connectivity has reached a tipping point globally as 5G networks are now active in 47 of the world’s 70…

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help
28
Apr
2023

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Software Supply Chain Attacks Are On the Rise  Because open source component use is widespread in cloud-native application development, software…

Many Public Salesforce Sites are Leaking Private Data – Krebs on Security
28
Apr
2023

Many Public Salesforce Sites are Leaking Private Data – Krebs on Security

A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their…

Detectify achieves ISO 27001 Certification
28
Apr
2023

Detectify achieves ISO 27001 Certification

The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July…

28
Apr
2023

ChatGPT writes insecure code

Researchers have found that ChatGPT, OpenAI’s popular chatbot, is prone to generating insecure code. Research by computer scientists associated with…

How attackers evade traditional AV and how to stop them
28
Apr
2023

How attackers evade traditional AV and how to stop them

Find threats camouflaging themselves in RAM. When you hear about malware, there’s a good chance you think of sketchy executables…

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security
28
Apr
2023

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security

HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity.  “New and significant attacks related…

These 38 games similar to Minecraft that you should never play if you don't want to get hack
28
Apr
2023

These 38 games similar to Minecraft that you should never play if you don’t want to get hack

Minecraft is a well-known video game that may be enjoyed either on a personal computer or on a mobile device….

Magecart threat actor rolls out convincing modal forms
28
Apr
2023

Magecart threat actor rolls out convincing modal forms

It’s hard to put individuals at fault when the malicious copy is better than the original. This credit card skimmer…

Do you trust your cache? – Web Cache Poisoning explained
28
Apr
2023

Do you trust your cache? – Web Cache Poisoning explained

As we are all currently confined to a life at home during the pandemic, it has become more important than…

Vulnerability Remediation | A Step-by-Step Guide
27
Apr
2023

Vulnerability Remediation | A Step-by-Step Guide

  What Is Vulnerability Remediation? Vulnerability remediation is the process of addressing system security weaknesses. The steps include the following:…