Real-Time Protection Against Lateral Movement
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations…
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations…
After three years running a successful private bug bounty program on HackerOne, Reddit has announced that it’s taking their bug bounty program public. We sat down with Reddit’s…
Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and…
The Payment Card Industry Data Security Standard (PCI DSS) program provides an information security compliance benchmark for companies that are handling, processing and storing cardholder…
Lawmakers remain perplexed over how all these classified documents keep getting out, in part because, at the Capitol, sensitive documents are kept under lock, armed guard,…
The FBI Director disclosed to the Congressional Committee that China has assigned around 50 hackers against each bureau’s Cyber Warriors, thus opening-up about the threats…
Social engineering is a term used to describe the manipulation of people into revealing sensitive information or performing actions that they otherwise wouldn’t. It is…
May 01, 2023Ravie LakshmananMalverposting / Scam A Vietnamese threat actor has been attributed as behind a “malverposting” campaign on social media platforms to infect over…
How HackerOne Helps the Vulnerability Management Process HackerOne sees vulnerability management as a process combining software tools and security analyst actions to reduce risk. In…
May 01, 2023Ravie LakshmananThreat Analysis / Cyber Attack The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks perpetrated by Russian nation-state…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from…
Introduction As organizations move towards digitization, security has become a significant part of their operations. Software-Defined Perimeter (SDP) and Virtual Private Networks (VPN) are two…