The world with a lock in it
26
Apr
2023

Google will add End-to-End encryption to Google Authenticator

Google is bringing end-to-end encryption to Google Authenticator cloud backups after researchers warned users against synchronizing 2FA codes with their…

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?
26
Apr
2023

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At…

What Is a Bug Bounty? Should You Offer One? And How To Do It
26
Apr
2023

What Is a Bug Bounty? Should You Offer One? And How To Do It

What Is a Bug Bounty? A bug bounty is a reward offered by organizations to ethical hackers for discovering security…

Arrest
26
Apr
2023

Ukrainian arrested for selling data of 300M people to Russians

The Ukrainian cyber police have arrested a 36-year-old man from the city of Netishyn for selling the personal data and…

Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.
26
Apr
2023

Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.

Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…

Detectify security updates for November 30
26
Apr
2023

Detectify security updates for November 30

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

A US Bill Would Ban Kids Under 13 From Joining Social Media
26
Apr
2023

A US Bill Would Ban Kids Under 13 From Joining Social Media

While all the major Silicon Valley social media firms—from Instagram to TikTok—say they block children from using their apps, these…

How Hackers Can Strengthen Cloud Security for Applications
26
Apr
2023

How Hackers Can Strengthen Cloud Security for Applications

What Does the Rise of Cloud Mean?  According to Bressers, “It was easy to believe that your systems were secure in…

PrestaShop
26
Apr
2023

PrestaShop fixes bug that lets any backend user delete databases

The open-source e-commerce platform PrestaShop has released a new version that addresses a critical-severity vulnerability allowing any back-office user to…

Detectify checks for critical Oracle WebLogic Server RCEs (CVE-2020-14882, CVE-2020-14750)
26
Apr
2023

Detectify checks for critical Oracle WebLogic Server RCEs (CVE-2020-14882, CVE-2020-14750)

On October 29th, Detectify released a security test to detect a critical Oracle WebLogic Server RCE – CVE-2020-14882. Again in…

Cisco
26
Apr
2023

Cisco discloses XSS zero-day flaw in server management tool

Cisco disclosed today a zero-day vulnerability in the company’s Prime Collaboration Deployment (PCD) software that can be exploited for cross-site…

Panda
26
Apr
2023

Tencent QQ users hacked in mysterious malware attack, says ESET

A Chinese APT hacking group known as ‘Evasive Panda’ is linked to a mysterious attack that distributed the MsgBot malware as…