We previously looked at common server authentication issues we see in code review and offered tips to avoid them. If you followed…
We’ve put together a list of the most visited Detectify blog posts on common web vulnerabilities to help anyone interested…
This is a member-only post. Thank you for being part of this. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image:…
Some thoughts and concrete suggestions on saving society through programming. This morning I read an article that’s been making the…
Question: “I spend the majority of my time researching and keeping up with current affairs. I don’t feel like anything…
Detectify announces presence at Black Hat USA. In-person and virtual participation in leading cybersecurity conference will empower companies to keep…
LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 5, 2022…
A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by…
Abstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,…
Users of Chrome should ensure they’re running the latest version to patch an integer overflow in the Skia graphics library….
A guide to using Amazon Web Services to serve your site with HTTPS. For (almost) free. 2017-12-13 20:46:12 -0500 -0500…