Assign severity to policy breaches AppSec teams often struggle to either validate or scale their security policies, like enforcing security…
May 12, 2023Ravie LakshmananLinux / Malware A previously undocumented and mostly undetected variant of a Linux backdoor called BPFDoor has…
The Play ransomware group has leaked 5GB of pilfered data allegedly from the City of Lowell cyber attack. The official…
It’s been two years since Upserve launched its public bug bounty program on HackerOne. During that time, Upserve’s security team…
In today’s interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees, secure collaboration has become increasingly…
An email has revealed that a senior Post Office lawyer bragged about how his team successfully prosecuted a subpostmaster for…
The Internet of Things is new, exciting, and unregulated. What could possibly go wrong? Security analyst Emma Lilliestam highlights the…
The widely-used Elementor plugin, “Essential Addons for Elementor,” has been discovered to have a security flaw that enables unauthorized users…
Storage manufacturers constantly work to improve capacity and cut costs. Nowhere is this more apparent than with flash storage, where capacities…
Our civilization is going digital. That’s fantastic. Unfortunately our software is not secure enough to carry a digital and connected…
As the threats against the Internet of Things are on the rise, several types of research are going on to…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on…