Coming hot off our successful funding round of €21.5 million in November 2019, we had no plans of stopping –…
While those working in InfoSec and GRC have high levels of confidence in their cyber/IT risk management systems, persistent problems…
Created/Updated: September 7, 2022 In today’s standalone episode I’m going to talk about some new gaming ideas I’ve not seen…
Web properties are increasingly relying on third-party JavaScript to increase functionality, but this can also bring inherent risks. A report…
December 17th Update: Vulnerabilities in Log4j have been evolving over the course of this week since the original disclosure of…
On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the…
Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group. The Canadian Yellow Pages Group has confirmed it…
Created/Updated: September 21, 2022 My mom died on Saturday. My biological mother became unable to function when I was around…
Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…
We take a look at a GuLoader campaign which comes bundled with an Italian language fake shipment email. GuLoader, a…
Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities….
Kernel-mode Hardware-enforced Stack Protection is a security feature introduced in Windows 11 22H2 that protects systems from various memory attacks,…