Five Best Practices In 2023 For Threats
23
Apr
2023

Five Best Practices In 2023 For Threats

Everything in your house being connected to the internet – your coffee machine, thermostat, fridge, car, even your toothbrush –…

How to Catch Injection Security Vulnerabilities in Code Review
23
Apr
2023

How to Catch Injection Security Vulnerabilities in Code Review

Understanding Injection Vulnerabilities Injection vulnerabilities exist when information provided by users of the application is not properly validated or sanitized…

Hacker Group Names Are Now Absurdly Out of Control
23
Apr
2023

Hacker Group Names Are Now Absurdly Out of Control

What if a hacker group thought to be part of a nation’s intelligence agency turns out to be a hacker-for-hire…

Detectify Security Updates May 17
23
Apr
2023

Detectify Security Updates May 17

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

News, Analysis, and Discovery | NO. 356
23
Apr
2023

News, Analysis, and Discovery | NO. 356

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 356 |…

The Intrusion Detection And Prevention Systems In 2023
23
Apr
2023

The Intrusion Detection And Prevention Systems In 2023

Increasing threats and cyberattacks have increased the demand for higher spending on cybersecurity infrastructure. Detecting incoming malicious activity requires tools…

23
Apr
2023

How I ditched WordPress and set up my custom domain HTTPS site for (almost) free | victoria.dev

A guide (for the minimally tech-savvy) to setting up a website with HTTPS using Hugo, Cloudflare and GitHub Pages. I…

Trigona Ransomware
23
Apr
2023

Hackers Using Mimikatz Hacking Tool to Deploy Trigona Ransomware

The Unit42 research team at Palo Alto Networks has recently discovered Trigona ransomware that attacks Windows with uncommon techniques and…

Hackerone logo
23
Apr
2023

The Top 5 Most Common Security Issues I Discover When Reviewing Code

NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real security issues I’ve found while…

23
Apr
2023

Week in review: 5 free online cybersecurity resources for SMBs, AI tools might fuel BEC attacks

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Balancing cybersecurity with business priorities:…

Humans of Detectify – Helping our customers with appsec success
23
Apr
2023

Humans of Detectify – Helping our customers with appsec success

The crowd has spoken… Earlier this year, G2 reviews platform awarded Detectify with a Best Support badge for our category…

NO. 357 | NEWS, ANALYSIS, & DISCOVERY SERIES
23
Apr
2023

NO. 357 | NEWS, ANALYSIS, & DISCOVERY SERIES

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 14, 2022…