GitHub announced that private vulnerability reporting is now generally available and can be enabled at scale, on all repositories belonging…
When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we immediately added PullRequest’s assets to…
The Security Research Group at Astrix discovered a zero-day vulnerability in Google’s Cloud Platform (GCP), which means that all Google…
Pedro Merino has brought this value of team work off the court to help the Finance team at Detectify manage…
Should we be thinking about corporate workforces as tiny crews dedicated to an extreme life for extreme profit? Created/Updated: November…
An explanation of closures and how they can emulate private methods in JavaScript. Say you’re having a little coding get-together,…
Employees of the US Immigration and Customs Enforcement agency (ICE) abused law enforcement databases to snoop on their romantic partners,…
Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to…
Walmart has been named as the brand most likely to be imitated in brand phishing attacks by cybercriminals in their…
In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what security controls it should ideally…
Detectify is helping tech organizations bring safer web products to market by providing crowdsourced, cloud-based, continuous web app security. Here’s…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 28, 2022…