Weaponizing N-Day Vulnerabilities
09
May
2023

Hacking Groups Rapidly Weaponizing N-Day Vulnerabilities

Iranian hacker group ‘Mint Sandstorm’ is retaliating against recent attacks on its infrastructure by targeting critical US infrastructure, as recently…

#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek
09
May
2023

#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek

    When I first started mobile hacking, it felt a lot like the wild west. There were very few…

Ransomware
09
May
2023

New Ransomware Strain ‘CACTUS’ Exploits VPN Flaws to Infiltrate Networks

May 09, 2023Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that…

Dating Apps And Sites: Mitigating Chargebacks In 2023
09
May
2023

How To Get It Right

The ransomware attack on the City of Oakland evoked several discussions, from the lax security of public administration bodies to…

Four IT security role models - and what you can learn from them
09
May
2023

Four IT security role models – and what you can learn from them

Many of the role models in IT security are tech giants known for being at the cutting-edge of technology. The…

How To Delete Your Data From ChatGPT
| WIRED
09
May
2023

How To Delete Your Data From ChatGPT | WIRED

OpenAI has now introduced a Personal Data Removal Request form that allows people—primarily in Europe, although also in Japan—to ask…

Jobs that will be lost for sure with adoption of Artificial Intelligence Technology
09
May
2023

Jobs that will be lost for sure with adoption of Artificial Intelligence Technology

Tesla CEO Elon Musk has predicted that computers and intelligent machines will eventually replace manual labor, resulting in humans losing…

Hyatt Celebrates its First Anniversary on HackerOne
09
May
2023

Hyatt Celebrates its First Anniversary on HackerOne

After becoming the first hospitality brand to launch a public bug bounty program, Hyatt recently celebrated its first anniversary of…

Cyber security for marketers
09
May
2023

5 Cybersecurity Tips for Marketers

Cybersecurity used to be the domain of small, highly specialised teams working with security behind closed doors. Those days are…

To enable ethical hackers, a law reform is needed
09
May
2023

To enable ethical hackers, a law reform is needed

Organizations need to be able to match the ingenuity and resources of cybercriminals to better defend themselves against the increasing…

What to Look For in a Penetration Testing Company
09
May
2023

Congratulations, Cosmin! The world’s seventh million-dollar bug bounty hacker

The entire HackerOne team is beyond excited that the ranks of seven-figure-earning hackers have risen to eight this month. Cosmin…

One year of Detectify’s hacker network Crowdsource
09
May
2023

One year of Detectify’s hacker network Crowdsource

A year ago, we launched our crowdsourced security community Detectify Crowdsource. It’s been a fantastic year filled with exciting security…