Top 4 takeaways from AppSec EU and Black Hat USA
We recently attended two key security conferences, OWASP AppSec EU and Black Hat USA to talk about web application security...
Read more →We recently attended two key security conferences, OWASP AppSec EU and Black Hat USA to talk about web application security...
Read more →May 05, 2023Ravie LakshmananCyber Threat / Malware The North Korean state-sponsored threat actor known as Kimsuky has been discovered using...
Read more →Joe Sullivan, the former Uber CSO who has been convicted last year for attempting to cover up a data breach...
Read more →May 05, 2023Ravie LakshmananProgramming / Software Security PHP software package repository Packagist revealed that an “attacker” gained access to four...
Read more →Moving a company’s IT into the cloud is seen a reasonable thing to do for many companies as it has...
Read more →Everyone is talking about ChatGPT, the free chatbot based on artificial intelligence created by OpenAI. The non-profit artificial intelligence research...
Read more →What is pentesting? What is the OWASP Top 10? How is pentesting different than bug bounty? How can I take...
Read more →NodeStealer, a newly discovered malware on Meta, was identified by Facebook as stealing browser cookies. Due to this vulnerability, threat...
Read more →Cisco has revealed the existence of a critical vulnerability (CVE-2023-20126) in the web-based management interface of Cisco SPA112 2-Port Phone...
Read more →Thank you for joining! Access your Pro+ Content below. May 2023 Vendors need to listen and learn Share this item...
Read more →The ALPHV/BlackCat ransomware group has claimed responsibility for the Constellation Software cyber attack. The latest post on the ransomware gang’s...
Read more →For continuous coverage, we push out a major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,...
Read more →