Data a driving force at Aston Martin Formula One
25
Apr
2023

Data a driving force at Aston Martin Formula One

Thank you for joining! Access your Pro+ Content below. 25 April 2023 Data a driving force at Aston Martin Formula…

Detectify security updates for January 25
25
Apr
2023

Detectify security updates for January 25

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

Indian Government Hacked: "Operation India" Announces Its Plan For Cyber Attacks On India
25
Apr
2023

Indian Government Hacked: “Operation India” Announces Its Plan For Cyber Attacks On India

The Indian government hacked! The news looks like something out of a movie, but hacktivist groups have allegedly attacked several…

Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson
25
Apr
2023

Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson

John Deere’s CISO, James Johnson, and his team are committed to ensuring that the people who depend on John Deere…

Ghosttoken - Zero-Day
25
Apr
2023

0-day Flaw Lets Attackers Access to Google Accounts

Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation….

Detectify's ISO 27001 certification use case and guide for SaaS companies
25
Apr
2023

Detectify’s ISO 27001 certification use case and guide for SaaS companies

An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A…

Mossad cyber attack
25
Apr
2023

Anonymous Sudan Targets Israel Intelligence Agency

Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of…

Cyber Attack news headlines trending on Google
25
Apr
2023

Cyber Attack news headlines trending on Google

Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News…

25
Apr
2023

AI tools help attackers develop sophisticated phishing campaigns

Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,…

Donating Bounties to Humanitarian Efforts in Ukraine
25
Apr
2023

Donating Bounties to Humanitarian Efforts in Ukraine

In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes….

Microsoft Taxonomy
25
Apr
2023

Microsoft Changed the Taxonomy of Naming the Hacker groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…

25
Apr
2023

The silent killers in digital healthcare

As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…