Introducing Hacker Dashboard: Your personalized HackerOne overview
Earlier this month, we introduced the all-new Program Directory with a fresh set of metrics and better filtering. Now, we’re taking it a step further…
Earlier this month, we introduced the all-new Program Directory with a fresh set of metrics and better filtering. Now, we’re taking it a step further…
University of Sydney’s Emiliano Fisanotti. The University of Sydney is set to renew its use of Azul’s Java platform after switching from an Oracle Java…
Cross-site Request Forgery (CSRF) is one of the vulnerabilities on OWASP’s Top 10 list. Its an attack used to make requests on behalf on the user.…
US pharmacy giant PharMerica has reported a cybersecurity incident that affects over 5.8 million people. The data theft has been claimed by ransomware group Money…
Hacktivity is a treasure trove of vulnerability data and tactics. You’ve got newly published reports from across the web, staple programs that believe in the…
We take a look at yet another ransomware group making use of leaked Babuk code. The bones of long gone ransomware group Babuk continue to…
Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update and simplify data protection routines…
By Aaron Sandeen, CEO and co-founder at In 2023, you can divide organizations into two categories: those who have been hit by a ransomware attack…
Earlier this year we introduced Hacker Email Aliases which enables you to secure set up accounts for hackers inside your program, but to make it…
Visual Studio Code, more often known by its acronym VSCode, is a source code editor that was created by Microsoft and is available for free.…
Automation should be for everyone, which is why we at Detectify love Zapier. We wanted to make it possible for our customers to use Detectify…
Image: Bing Create A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of demanding a ransom payment, the…