Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs
24
Apr
2023

Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs

How Are Bug Bounty Programs and Vulnerability Disclosure Programs Different? Let’s start with the similarities. Both bug bounties and VDPs…

ChatGPT Can be Tricked To Write Malware When You Act as a Developer
24
Apr
2023

ChatGPT Tricked To Write Malware When You Act as a Developer

Japanese Cybersecurity experts have found that ChatGPT could write code for malware by entering a prompt that makes the AI…

What is offensive Cyber Capabilities
24
Apr
2023

What is offensive Cyber Capabilities

In recent years, the term “offensive cyber capabilities” has become increasingly common in discussions around national security and military strategies….

Detectify Security Updates for March 23
24
Apr
2023

Detectify Security Updates for March 23

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

A third-party’s perspective on third-party InfoSec risk management
24
Apr
2023

A third-party’s perspective on third-party InfoSec risk management

More than ever, organizations are relying on third parties to streamline operations, scale their business, expand and leverage expertise, and…

apple-winning-miessler
24
Apr
2023

Why Apple Keeps Winning – Daniel Miessler

Apple’s competitors haven’t solved the trinity of quality, design, and ecosystem Created/Updated: October 31, 2022 People are blown away that…

Study of past cyber attacks can improve organizations' defense strategies
24
Apr
2023

Study of past cyber attacks can improve organizations’ defense strategies

Ransomware operators have been increasingly launching frequent attacks, demanding higher ransoms, and publicly exposing victims, leading to the emergence of…

HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch
24
Apr
2023

HackerOne Announces a New Customer Pentest Setup that’s More Efficient and Speeds Time to Launch

This improved experience reduces time to launch, which is vital when your organization is up against an urgent timeline to…

Patented.ai releases LLM Shield to safeguard sensitive info from chatbots
24
Apr
2023

Patented.ai releases LLM Shield to safeguard sensitive info from chatbots

Patented.ai has released its introductory tool, LLM Shield that allows companies to safeguard their most sensitive data – proprietary source…

Humans of Detectify: You don't need to be an expert to get into security
24
Apr
2023

Humans of Detectify: You don’t need to be an expert to get into security

At Detectify, we’re on a journey to make the Internet more secure with the powerful combination of security automation and…

NO. 355 | NEWS & ANALYSIS SERIES
24
Apr
2023

NO. 355 | NEWS & ANALYSIS SERIES

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | October 31, 2022…

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project
24
Apr
2023

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project

As shown in Figure 1 below, even early reviews can provide value. Figure 1: An early PullRequest code review. Catching…