0-day Flaw Lets Attackers Access to Google Accounts
Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation....
Read more →Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation....
Read more →An ISO 27001 certification use case from Detectify with the on-demand webinar and a guide to implementation (download ebook): A...
Read more →Mossad Cyber Attack: Anonymous Sudan disrupted the Mossad website with a Distributed Denial of Service (DDoS) attack. Mossad, one of...
Read more →Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News...
Read more →Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,...
Read more →In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable causes....
Read more →Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to...
Read more →As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help...
Read more →Apr 25, 2023Ravie LakshmananPassword Security / Authentication Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator...
Read more →One of the most malicious cybercriminal groups LockBit, was found sharing a recruitment post on its website on the dark...
Read more →In this new series, Security Defender Insights, Detectify is recognizing Security Defenders in our network to bring you actionable insights...
Read more →The lack of visibility into the software supply chain creates an unsustainable cycle of discovering vulnerabilities and weaknesses in software...
Read more →