Detectify Connector with AWS Route 53
29
Apr
2023

Detectify Connector with AWS Route 53

Last year Detectify announced that we were AWS Technology Partners which meant that getting started with Detectify was made easier….

Hackers target vulnerable Veeam backup servers exposed online
29
Apr
2023

Hackers target vulnerable Veeam backup servers exposed online

Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile…

Top 13 SaaS Cybersecurity Threats in 2023
29
Apr
2023

Top 13 SaaS Cybersecurity Threats in 2023

Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be…

How HackerOne Positively Influences Zebra’s Software Development Life Cycle
29
Apr
2023

How HackerOne Positively Influences Zebra’s Software Development Life Cycle

HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug…

The Tragic Fallout From a School District’s Ransomware Breach
29
Apr
2023

The Tragic Fallout From a School District’s Ransomware Breach

Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC…

Detectify secures 21.5 million EUR with Balderton
29
Apr
2023

Detectify secures €21,5 million in Series B round to bring world-class cyber security to everyone

Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture…

Hackers selling macOS Stealer
29
Apr
2023

Hackers are Selling a new Atomic macOS (AMOS) Stealer

Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was…

How to Remove Your Personal Info From Google's Search Results
29
Apr
2023

How to Remove Your Personal Info From Google’s Search Results

Last year, Google expanded the ways you can submit removal requests for search results containing personal info. Before this change, people…

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows
29
Apr
2023

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

 Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to…

Detectify year in review 2019
29
Apr
2023

Detectify year in review 2019

Detectify year in review: 2019 has been quite a journey so far with expansion to the US and doubling our…

What is Keylogger? How it Works?
29
Apr
2023

What is Keylogger? How it Works?

Keylogger is a malicious computer program that records everything you type on the keyboard, learns the keystroke pattern, including words,…

What Are Bug Bounties? How Do They Work? [With Examples]
29
Apr
2023

What Are Bug Bounties? How Do They Work? [With Examples]

How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…