Hack for Good: Easily Donate Bounties to WHO’s COVID-19 Response Fund
21
May
2023

New Hacker101 Content: Threat modeling, Burp basics, and more

Since January, thousands of hackers have expressed their enthusiasm for the first Hacker101 content drop (almost 80,000 total video views…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
21
May
2023

IT Security FAQ 1: What should you think about when approving an app on Facebook?

There are all kinds of apps on Facebook – quizzes, games and corporate sweepstakes. But it might be a good…

The Real Risks in Google’s New .Zip and .Mov Domains
21
May
2023

The Real Risks in Google’s New .Zip and .Mov Domains

At the beginning of May, Google released eight new top-level domains (TLDs)—the suffixes at the end of URLs, like “.com”…

Lawfully Hacked | HackerOne
21
May
2023

Hacker-Powered pen tests at the U.S. Federal Government

When looking for a model to inform your own security posture, the Department of Defense would be a good place…

Your site may be hacked flag
21
May
2023

GUIDE: How to get rid of your ‘This site may be hacked’-flag

You might have noticed that Google occasionally flags some websites with a “This site may be hacked”-flag or a “This…

PyPI Repository
21
May
2023

User Sign-Ups and Package Uploads Temporarily Halted

May 21, 2023Ravie LakshmananSoftware Security / Malware The maintainers of Python Package Index (PyPI), the official third-party software repository for…

Week in review: KeePass vulnerability, Apple fixes exploited WebKit 0-days
21
May
2023

Week in review: KeePass vulnerability, Apple fixes exploited WebKit 0-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple fixes WebKit 0-days under…

There is no room for racism or inequality here.
21
May
2023

Hey Startups, Check Your GDPR Progress with this GDPR Checklist

GDPR is finally upon us. The onslaught of “we’ve updated our privacy policy” emails to your inbox should have been…

[Alert] Critical authentication bypass + privilege escalation exploit in Joomla
21
May
2023

Joomla security – Detectify Blog

Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
21
May
2023

Jackpot! The h1-702 2018 CTF is here! Win a Trip to the Biggest Live-hacking Event of 2018

The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August…

Top 3 takeaways from CIO Trend 2016
21
May
2023

Top 3 takeaways from CIO Trend 2016

In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this…

IBM Acquired Cloud Data Protection Company Polar Security
21
May
2023

IBM Acquired Cloud Data Protection Company Polar Security

Since Arvind Krishna became the CEO in April 2020, IBM has acquired more than 30 companies. They made their 5th…