Detectfy year in review 2020
26
Apr
2023

Detectify Company Year in Review 2020

Coming hot off our successful funding round of €21.5 million in November 2019, we had no plans of stopping –…

26
Apr
2023

Corporate boards pressure CISOs to step up risk mitigation efforts

While those working in InfoSec and GRC have high levels of confidence in their cyber/IT risk management systems, persistent problems…

Metagaming: An Interview With Andrew Ringlein
26
Apr
2023

Metagaming: An Interview With Andrew Ringlein

Created/Updated: September 7, 2022 In today’s standalone episode I’m going to talk about some new gaming ideas I’ve not seen…

26
Apr
2023

Halo Security detects exposed secrets and API keys in JavaScript

Web properties are increasingly relying on third-party JavaScript to increase functionality, but this can also bring inherent risks. A report…

Log4j Vulnerability Activity on the HackerOne Platform
26
Apr
2023

Log4j Vulnerability Activity on the HackerOne Platform

December 17th Update:  Vulnerabilities in Log4j have been evolving over the course of this week since the original disclosure of…

New WordPress plugin vulnerabilities
26
Apr
2023

How attackers exploit the WordPress Easy-WP-SMTP zero-day

On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the…

Black Basta ransomware attacks Yellow Pages Canada
26
Apr
2023

Black Basta ransomware attacks Yellow Pages Canada

Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group. The Canadian Yellow Pages Group has confirmed it…

RhondaMiessler
26
Apr
2023

My Mom Died on Saturday

Created/Updated: September 21, 2022 My mom died on Saturday. My biological mother became unable to function when I was around…

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks
26
Apr
2023

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks

Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…

GuLoader returns with a rotten shipment
26
Apr
2023

GuLoader returns with a rotten shipment

We take a look at a GuLoader campaign which comes bundled with an Italian language fake shipment email. GuLoader, a…

CWE (Common Weakness Enumeration) and the CWE Top 25 Explained
25
Apr
2023

CWE (Common Weakness Enumeration) and the CWE Top 25 Explained

Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities….

Microsoft Defender logo on a colorful background
25
Apr
2023

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

Kernel-mode Hardware-enforced Stack Protection is a security feature introduced in Windows 11 22H2 that protects systems from various memory attacks,…