Vulnerabilities - Detectify Blog
22
May
2023

GUIDE: The false positive report process

My name is Linus Särud. I’m a Detectify Security Researcher and responsible for incoming support emails. Going forward, we will…

Microsoft 365
22
May
2023

Microsoft 365 hit by new outage causing connectivity issues

Microsoft is investigating service issues preventing users from accessing their Microsoft 365 accounts and blocking access to installed apps. The…

DarkBERT: Unleashing the Power of AI to Illuminate the Dark Web
22
May
2023

Enhancing Cybersecurity Efforts on the Dark Web

DarkBERT has been fed approximately 6.1 million pages found on the dark web as part of its large-scale pretraining on…

Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption
22
May
2023

Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption

Jakubowska, who reviewed the document, says that several countries appear to say they would give police access to people’s encrypted…

How does Pentesting fit into your overall security strategy?
22
May
2023

h1-202 CTF Winners Announced (and links to write-ups)

Thanks to all of you who participated in the h1-202 CTF!  We had a lot of fun building it and…

New vulnerability findings: Joomla, JBoss, Jenkins and others!
22
May
2023

New vulnerability findings: Joomla, JBoss, Jenkins and others!

During the past month, a great deal has happened in the web security landscape, and we have added a ton…

Pentagon
22
May
2023

Pentagon explosion hoax goes viral after verified Twitter accounts push

Highly realistic AI-generated images depicting an explosion near the Pentagon that went viral on Twitter caused the stock market to…

This guy robbed 200,000 people via 10 million spoofed phone calls
22
May
2023

This guy robbed 200,000 people via 10 million spoofed phone calls

Tejay Fletcher, the brains of the infamous scam website iSpoof, was given a sentence of 13 years and 4 months…

There is no room for racism or inequality here.
22
May
2023

Calling All “Bureaucracy Hackers” | HackerOne

Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity firm, thinks the government needs more help from hackers….

Crypto Mining
22
May
2023

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations

May 22, 2023Ravie LakshmananCryptocurrency / Cloud Security A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon…

[Integration] You can now integrate Detectify with HipChat
22
May
2023

[Integration] You can now integrate Detectify with HipChat

HipChat is another one of Detectify’s workflow integrations – there are still many more to come! Set up your integration with…

Cryptocurrency falling
22
May
2023

Crypto phishing service Inferno Drainer defrauds thousands of victims

A cryptocurrency phishing and scam service called ‘Inferno Drainer’ has reportedly stolen over $5.9 million worth of crypto from 4,888…