We take a look at YouTube’s testing of ad blocking detection and why it might not be popular with users….
Where To Begin? Companies submitting products for FDA approval must do the following: Provide details of their process to monitor,…
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis…
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on…
A significant vulnerability has been discovered in Foxit PDF Reader, a well-liked alternative to the PDF software developed by Adobe….
May 12, 2023Ravie LakshmananCyber Threat / Malware Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a…
Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions,…
This week we have multiple reports of new ransomware families targeting the enterprise, named Cactus and Akira, both increasingly active…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on…
Automation transforms the audit experience. What was once a burden to bear becomes a competitive advantage that lets your company…
Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat…