The Most Overlooked Server Permission Checks
22
Apr
2023

The Most Overlooked Server Permission Checks

We previously looked at common server authentication issues we see in code review and offered tips to avoid them. If you followed…

Common web vulnerabilities every hacker and developer should know
22
Apr
2023

Common web vulnerabilities every hacker and developer should know

We’ve put together a list of the most visited Detectify blog posts on common web vulnerabilities to help anyone interested…

The UL Boost Protocol
22
Apr
2023

The UL Boost Protocol

This is a member-only post. Thank you for being part of this. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image:…

About time | victoria.dev
22
Apr
2023

About time | victoria.dev

Some thoughts and concrete suggestions on saving society through programming. This morning I read an article that’s been making the…

Hacker's Health: Adverse Effects of Doomscrolling
22
Apr
2023

Hacker’s Health: Adverse Effects of Doomscrolling

Question: “I spend the majority of my time researching and keeping up with current affairs. I don’t feel like anything…

Detectify announces presence at Black Hat USA 2021
22
Apr
2023

Detectify announces presence at Black Hat USA 2021

Detectify announces presence at Black Hat USA. In-person and virtual participation in leading cybersecurity conference will empower companies to keep…

Ransomware on MacOS
22
Apr
2023

First-Ever Ransomware Found to be Attacking macOS

LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware…

NO. 360 | NEWS, ANALYSIS & DISCOVERY SERIES
22
Apr
2023

NO. 360 | NEWS, ANALYSIS & DISCOVERY SERIES

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 5, 2022…

AuKill  Malware
22
Apr
2023

AuKill Malware Kills EDR Clients To Attack Windows Systems

A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by…

Physical Layer Key Generation Method Based on SVD Pre-processing
22
Apr
2023

Physical Layer Key Generation Method Based on SVD Pre-processing

Abstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,…

Update now, there's a Chrome zero-day in the wild
22
Apr
2023

Update now, there’s a Chrome zero-day in the wild

Users of Chrome should ensure they’re running the latest version to patch an integer overflow in the Skia graphics library….

22
Apr
2023

Hosting your static site with AWS S3, Route 53, and CloudFront

A guide to using Amazon Web Services to serve your site with HTTPS. For (almost) free. 2017-12-13 20:46:12 -0500 -0500…