Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…
As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…
Apr 25, 2023Ravie LakshmananPassword Security / Authentication Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator…
One of the most malicious cybercriminal groups LockBit, was found sharing a recruitment post on its website on the dark…
In this new series, Security Defender Insights, Detectify is recognizing Security Defenders in our network to bring you actionable insights…
The lack of visibility into the software supply chain creates an unsustainable cycle of discovering vulnerabilities and weaknesses in software…
As user credentials continue to be a top vector for cyberattacks, organizations are under tremendous pressure to rethink the effectiveness…
We sat down with James Ritchey, Application Security Team Manager at GitLab and a three-year member of HackerOne’s Technical Advisory…
Apple’s Lockdown Mode has shown that it can do what it was designed to do by notifying users about an…
Roshni Bham has been an account executive at Detectify for more than a year and she works to grow our…
The most interesting security related news from the week of April 17 – 23. Last week on Malwarebytes Labs: Malwarebytes…
Malwarebytes’ researchers have discovered a malvertising scheme that uses adult lures for clickjacking purposes. Malwarebytes’ researchers have found a malvertising…