Vulnerabilities Netgear Routers
12
May
2023

PoC Disclosed for Five Vulnerabilities to Exploit Netgear Routers

As the threats against the Internet of Things are on the rise, several types of research are going on to…

Newly added security tests, September 14, 2017: Selenium Grid
12
May
2023

Newly added security tests April 28, 2017: Hubspot and TenderApp

To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on…

ChatGPT Powered Vulnerability Detection Tool
12
May
2023

ChatGPT Powered Vulnerability Detection Tool

Cyber Security News came across a new ChatGPT-powered Vulnerability detection Tool called “BurpGPT,” which helps security researchers to detect the…

Understanding Trustworthy… - Cybersecurity Magazine
12
May
2023

Understanding Trustworthy… – Cybersecurity Magazine

It cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy…

12
May
2023

Greatness phishing-as-a-service threatens Microsoft 365 users

Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new…

Dragos Cyberattack – Hackers Contacted Firm CEO’s Son, Wife in Extortion Attempt
12
May
2023

Dragos Cyberattack – Hackers Contacted Firm CEO’s Son

A cybercriminal group obtained contracts from cybersecurity firm Dragos Inc. as part of an extortion attempt that involved contacting the chief…

How Companies Like Facebook Find the Bugs that Matter
12
May
2023

How Companies Like Facebook Find the Bugs that Matter

Bug bounty programs are instrumental in categorizing bugs, triaging, prioritizing, and shutting down vulnerabilities before they blow up. Tech companies…

Bl00dy Ransomware
12
May
2023

Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

May 12, 2023Ravie LakshmananVulnerability / Ransomware U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat…

CISA ICS Advisory Addresses 15 Vulnerabilities, Security Issues
12
May
2023

CISA ICS Advisory Addresses 15 Vulnerabilities, Security Issues

Organizations must immediately patch 15 industrial control systems vulnerabilities, warned the latest CISA ICS advisory. The Cybersecurity and Infrastructure Security…

Dating Apps And Sites: Mitigating Chargebacks In 2023
12
May
2023

World CyberCon Middle East 2023: The Premier Cybersecurity Conference

Riyadh, Saudi Arabia, 30 August 2023: The Cyber Express by Cyble, a leading cybersecurity news, and information platform, invites you…

6 months after the launch of Detectify Crowdsource: What has happened so far?
12
May
2023

6 months after the launch of Detectify Crowdsource: What has happened so far?

Detectify Crowdsource was born almost 6 months ago, and a lot has happened since then. Kristian Bremberg, Community Manager, who…

Github Push Protection
12
May
2023

Risks of Leaving USB Devices & Critical Enterprise Data Unmonitored

A USB device is a popular choice for storing data and information and, alas, a popular data theft target for…