pwyw-banner
20
May
2023

Convince Your Client To Use Detectify

  Want to offer your clients security and help them make their services safer with Detectify? That’s fantastic! Security is…

Samsung
20
May
2023

Samsung Devices Under Active Exploitation! CISA Warns of Critical Flaw

May 20, 2023Ravie LakshmananMobile Security / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation…

Improve Credential Sharing with Hacker Email Aliases
20
May
2023

Improve Credential Sharing with Hacker Email Aliases

Starting today, all existing and new hackers get a personalized email alias tied to their account, in the form of…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 6: What CMS is the most vulnerable?

A CMS is a Content Management System used to create, manage and organize content on a web sites or web…

Keeper Password Vulnerability
20
May
2023

KeePass Password Vulnerability Let Hackers Gain Master Password

KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
20
May
2023

Oath Bug Bounty Program Update: $1M in payouts and expansion of the program

This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally published on Oath.com. A little more…

OWASP Top 10 Vulnerabilities Explained
20
May
2023

OWASP Top 10 Vulnerabilities Explained

OWASP is a non-profit organization with the goal of improving the security of software and internet. They have put together…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Hacker-Powered Security Report 2018, 188 Facts

Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Sec FAQ – Detectify Blog

We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why…

Get hacked & blackmailed easily by buying a cheap Android-based TV, watch or smartphone
19
May
2023

Get hacked & blackmailed easily by buying a cheap Android-based TV, watch or smartphone

Recent events have revealed the existence of a widespread cybercriminal group going by the name “Lemon Group,” which is responsible…

Hive Ransomware? Let’s Learn All About It
19
May
2023

Hive Ransomware? Let’s Learn All About It

By Aaron Sandeen, CEO and co-founder at Since June 2021, Hive Ransomware has been dominating the ransomware scene. Their reach…

Slack Increases Bounty Minimums For the Next 90 Days
19
May
2023

7 Common Security Pitfalls to Avoid When Migrating to the Cloud

So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one…