3 quick questions with Security Awards nominee Jonatan Haltorp

Security Awards is a yearly event arranged by the Swedish publication Skydd och Säkerhet, where the aim is to highlight persons or companies that are improving the security industry. Detectify’s...

Surge in memcached-based reflected DDoS attacks is due to misconfigured servers

Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers exposed to...

SecBI to support Orange Polska in augmenting its managed security services

SecBI announced an agreement with Orange Polska in the field of network security. The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running several...

Inside 3 top threat hunting tools

In addition to providing tools for threat hunters, Endgame also acts as a more traditional endpoint protection program that fills the same role as antivirus, stopping low-level threats automatically. In...

Apache Struts Vulnerabilities | Detectify Blog

Apache Struts is a well-known development framework for Java-based web applications that is mostly used in enterprise environments. If you search for Apache Struts CVEs on MITRE, you currently get...

iPhone Headphone Jack Hacked back into an iPhone 7

iPhone Headphone Jack Hacked back into an iPhone 7 - Hacked Gadgets – DIY Tech Blog

Massive Email Address Leak Reported: 773 Million Unique Emails Exposed

Posted on January 17, 2019 at 6:11 PM While hacking attacks, malware infections, and data theft were a common part of the internet ever since its beginning, many argue that the situation...

Detecting Laptop Tampering – Schneier on Security

Blog > Detecting Laptop Tampering Micah Lee ran a two-year experiment designed to...

APLICATIONS

Instagram bends to GDPR – a “download everything” tool is coming...

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of...

HOT NEWS