Everything in your house being connected to the internet – your coffee machine, thermostat, fridge, car, even your toothbrush –…
Understanding Injection Vulnerabilities Injection vulnerabilities exist when information provided by users of the application is not properly validated or sanitized…
What if a hacker group thought to be part of a nation’s intelligence agency turns out to be a hacker-for-hire…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 356 |…
Increasing threats and cyberattacks have increased the demand for higher spending on cybersecurity infrastructure. Detecting incoming malicious activity requires tools…
A guide (for the minimally tech-savvy) to setting up a website with HTTPS using Hugo, Cloudflare and GitHub Pages. I…
The Unit42 research team at Palo Alto Networks has recently discovered Trigona ransomware that attacks Windows with uncommon techniques and…
NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real security issues I’ve found while…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Balancing cybersecurity with business priorities:…
The crowd has spoken… Earlier this year, G2 reviews platform awarded Detectify with a Best Support badge for our category…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 14, 2022…