Command and Control – JavaScript

There are a number command and controls tools that can use a variety fof methods in order to hide malicious traffic or execute implants in various formats. Casey Smith originally...

Is your Magento store vulnerable? Why it’s time to put security first

Magento is not only interesting for retailers – hackers like to target widely used platforms and the fact that online stores handle sensitive payment information is an added bonus. Our...

Microsoft Office – DDE Attacks

Microsoft Office is a common application that is deployed in every organisation. This wide usage transforms office into a tool that can be utilized to perform attacks that would allow...

Thousands of vulnerable Magento web stores out there

We checked 30,000 Magento stores for three publicly available vulnerabilities that are sometimes found in older Magento installations. Despite the most recent of the three vulnerabilities being fixed over a...

Meet the Hacker: Gerben Janssen van Doorn: “If you want to pursue ethical hacking,...

Gerben Janssen van Doorn, a 21-year old ethical hacker from The Netherlands, is one of our Detectify Crowdsource hackers. He smiles when asked about his first bug report, “a possible...

Hackers Steal Over $50 Million from Bitcoin Wallet Users using Poisoned Google Ads

Posted on February 15, 2018 at 7:16 PM A cybersecurity firm has discovered that hackers used poisoned Google ads to steal over $50 million worth of cryptocurrency from blockchain.info users. One of bitcoin’s...

[VIDEO SEMINAR] Magento security from a hacker’s perspective

Have you ever wondered how a hacker would analyze and attack a Magento website? We picked the brains of two ethical hackers to find out. Linus Särud, 18, and Fredrik...

LATEST NEWS

MUST READ