Thank you for joining! Access your Pro+ Content below. 25 April 2023 Data a driving force at Aston Martin Formula…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
The Indian government hacked! The news looks like something out of a movie, but hacktivist groups have allegedly attacked several…
John Deere’s CISO, James Johnson, and his team are committed to ensuring that the people who depend on John Deere…
Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation….
An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A…
Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of…
Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News…
Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,…
In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes….
Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…
As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…