[Integration] You can now integrate Detectify with Trello
For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to your favourite security to-do list.…
For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to your favourite security to-do list.…
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is…
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is?…
The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters that are redefining practices and industries. It was founded in…
Researchers have discovered multiple npm packages named after NodeJS libraries that even pack a Windows executable that resembles NodeJS but instead drops a sinister trojan. These…
People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head for every service you are…
HP is working to address a bad firmware update that has been bricking HP Office Jet printers worldwide since it was released earlier this month. While…
A new malware distribution campaign is underway impersonating the CapCut video editing tool to push various malware strains to unsuspecting victims. CapCut is ByteDance’s official…
Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as a one-and-done annual exercise. You hire a consultant, they run…
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker…
Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past few months we’ve been maniacally…
Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to access your account – often…