Want to offer your clients security and help them make their services safer with Detectify? That’s fantastic! Security is…
May 20, 2023Ravie LakshmananMobile Security / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation…
Starting today, all existing and new hackers get a personalized email alias tied to their account, in the form of…
A CMS is a Content Management System used to create, manage and organize content on a web sites or web…
KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to…
This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally published on Oath.com. A little more…
OWASP is a non-profit organization with the goal of improving the security of software and internet. They have put together…
Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since…
We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why…
Recent events have revealed the existence of a widespread cybercriminal group going by the name “Lemon Group,” which is responsible…
By Aaron Sandeen, CEO and co-founder at Since June 2021, Hive Ransomware has been dominating the ransomware scene. Their reach…
So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one…










