Through a Hacker’s Eyes: Recapping h1-604
For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a live event. Katie (@InsiderPhD)…
For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a live event. Katie (@InsiderPhD)…
One of WordPress’s most popular Elementor plugins, “Essential Addons for Elementor,” was found to be vulnerable to an unauthenticated privilege escalation that could allow remote…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
The Artificial Intelligence race has started since the release of ChatGPT in November 2022. There have been several Artificial Intelligence bots developed by organizations all…
The cybersecurity researchers at Cisco Talos recently affirmed that threat actors are targeting the widely-used Microsoft 365 cloud-based productivity platform through the Greatness phishing platform,…
Tokyo MoU, the most active regional port control organization in the Asia Pacific, has revealed that its data was compromised for months and that hackers…
11 May RSA Conference 2023: It Takes A Village To Raise A Cybersecurity Industry Posted at 11:34h in Blogs, Videos by Di Freeze Highlight reel…
May 11, 2023Ravie LakshmananCyber Crime / Phishing The National Police of Spain said it arrested 40 individuals for their alleged involvement in an organized crime…
HackerOne and the U.S. Department of Defense began working together in 2016 with the launch of Hack the Pentagon. Announced at the third annual Security@…
What has firmware got to do with pop rock, you ask? That’s the question that crossed a security researcher’s mind as he analyzed Kingston’s firmware and…
A previously undetected advanced persistent threat (APT) actor dubbed Red Stinger has been linked to attacks targeting Eastern Europe since 2020. “Military, transportation, and critical…
Detectify Crowdsource is a platform where hackers can submit vulnerabilities in web applications. Their findings are reviewed by our security team, and built into our…