Face tech – recognising the retail opportunity
There are few things in the retail industry that will generate more negative sentiment and attention from the media and privacy campaigners than the use of…
There are few things in the retail industry that will generate more negative sentiment and attention from the media and privacy campaigners than the use of…
Yeah, you heard me right: SvelteKit. The past few weeks I have found myself increasingly developing full-stack applications using SvelteKit. I have my reservations about…
ChatGPT, the sensational conversational app of Microsoft, has been identified as a threat to national security due to its increased sophistication in phishing scams. The…
In the margins of the commercial products aimed at backup for Kubernetes clusters – Kasten from Veeam, Trilio and Pure’s Portworx – the open source…
Dubai, UAE, 9 March 2023: The UAE Cybersecurity Council and GISEC Global 2023, the Middle East’s largest and most impactful cybersecurity event, today released a…
Four vulnerabilities in Wago Web-Based Management (WBM) Systems were found to allow cross-site scripting attacks, set device parameters, remote code execution, etc. CVE-2022-45140, CVE-2022-45139, CVE-2022-45138,…
Early each year, Detectify honors the top-performing ethical hackers within our Crowdsource community. To do so, we’ve put together our own “Oscars for hackers” –…
There have been recent revelations by Microsoft that an old version of the SHEIN Android application has been found reading the contents of the clipboard…
Google One unveiled two exciting additions to its range of features. Firstly, VPN by Google One will now be available to all plans, offering additional…
Mar 09, 2023Ravie LakshmananCryptojacking / Threat Detection, The infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt to…
Oakland City, California, faces the threat of another massive data leak after Play Ransomware released 10 GB of stolen data with a threat to release…
Today’s organizations have a plethora of tools and technologies to protect their systems and assets. While this is certainly a privilege, it can sometimes be…