BMW Data Breach Puts Customers Information At Risk!
29
Mar
2023

BMW Data Breach Puts Customers Information At Risk!

Play Ransomware group has claimed responsibility for the cyber attack on BMW France. The notorious group has threatened to publish…

security.txt adoption in Switzerland - EdOverflow
29
Mar
2023

security.txt adoption in Switzerland – EdOverflow

Recently, @ant0inet (Antoine) tweeted about a cursory scan they did against the .ch TLD to determine how many security.txt files…

Punjab Police attacked
29
Mar
2023

Punjab Police Attacked, Hackers Target Official Websites

While India’s Punjab police is preoccupied with the ongoing search operation for Khalistani separatist Amritpal Singh and his aide Papalpreet…

Scaling security automation with Docker
29
Mar
2023

Scaling security automation with Docker

What is Docker? Docker is an open-source platform that allows you to develop, deploy, and manage multiple applications across one…

Detectify Blog - Here's how EASM fills gaps missed by AppSec solutions
29
Mar
2023

Detectify Blog – Here’s how EASM fills gaps missed by AppSec solutions

We recently explored why developers have begun to ship more frequently to production, as well the relationship between more frequent…

A Military-Type Explosive Sent Via USB Drive
29
Mar
2023

A Military-Type Explosive Sent Via USB Drive

The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization’s newsroom. The explosion…

Understanding the difference between attack simulation vs penetration testing
29
Mar
2023

Understanding the difference between attack simulation vs penetration testing

Attack simulation and penetration testing are both methods used to identify vulnerabilities in a company’s cybersecurity infrastructure, but there are…

29
Mar
2023

Ignoring network automation is a ticking time bomb for security

IT professionals are frustrated due to the rise in network update velocity and tech stack sprawl, lack of support from…

Cybercrime
29
Mar
2023

North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations

Mar 29, 2023Ravie LakshmananCyber Threat / Espionage A new North Korean nation-state cyber operator has been attributed to a series…

Snatch Ransomware Group Adds The City To Leak Site
29
Mar
2023

Snatch Ransomware Group Adds The City To Leak Site

The City of Modesto is allegedly the latest victim of the Snatch ransomware group. While there is currently no sample data…

Post header image
29
Mar
2023

Discovering the IP address of a WordPress site hidden behind Cloudflare

Cloudflare is a company that provides domain name (DNS) services, Distributed Denial of Service (DDoS) protection, and a content delivery…

macOS-Based Malware
29
Mar
2023

New macOS-Based Malware Steals Passwords

Uptycs threat research team recently discovered “MacStealer,” a new information-stealing malware designed to target Apple’s macOS operating system. It aims…