Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

The Twitter mega-hack. What you need to know

What the heck has happened on Twitter? Twitter accounts, owned by politicians, celebrities, and large organisations suddenly started tweeting messages to their many millions of followers, at the behest of hackers. What did the messages say? Here is a typical one which appeared on the account of rapper, songwriter, and optimistic Presidential candidate Kanye West and was distributed to his almost 30 million followers.

Undetected e.04: TomNomNom - Hacking things back together

We know “go hack yourself,” but what about unhack yourself? According to Laura and Tom (@TomNomNom), it means understanding how something is built and how it works, before you can know if you’ve successfully hacked it apart. There were many valuable soundbites to take from this dynamic conversation between host Laura Kankaala and guest Tom Hudson of Detectify.

Detectify Crowdsource - Not Your Average Bug Bounty Platform

How does Detectify Crowdsource get the most skilled ethical hackers of the world to come together and have as broad an impact as possible? The answer – a bug bounty program, but not in the traditional way. I am Carolin Solskär, Detectify Crowdsource Community Manager and I work closely with our ethical hackers to make sure we maintain an awesome experience for all our members with the shared goal to make the Internet more secure.

Outpost24 webinar: Improve Your Organization's Security With Red Teaming

Security assessments can be performed in many ways, depending on your organization’s maturity level and goals. Whilst vulnerability scanning can help to identify security flaws on a broader scope and penetration testing can conclude the risk level of vulnerabilities discovered, if you need to understand the full picture of your organization’s security awareness and readiness, a scenario-based Red Teaming Assessment (RTA) is the best way to assess the effectiveness of your defence mechanism from a hacker’s view.

How were we Hacked? Part 2

I wrote recently about how Office 365 accounts are most commonly breached - through leaked credentials. This covered the different ways that credentials can be breached through various factors, including many human misconceptions and failures can be mixed with other internal and external forces. This article is going to cover the anatomy of what happens after the hacker has gained access. There are many things a hacker may be seeking including information extraction or means of corporate espionage.

What is Cyber Hacktivism?

We all know about hacking and hackers, but what about hacktivism and hacktivists? In this article, we will discuss what hacktivism is and how it can affect your organization. Hackers and the act of hacking found their way into mainstream long ago, with the help of high budget films and our increasing use of technology in almost every aspect of our lives. That is why almost everyone knows what hacking is and who a hacker is.

Undetected e.02 recap: Fredrik N. Almroth - Bug Bounties

Bug bounties – some argue that this is one of the buzzwords of the decade in the cybersecurity industry. Whatever you want to label it, it’s a trend that we can’t ignore these days. A lot of companies are taking part in it, so what’s it all about? There were many valuable soundbites to take from this, and especially from podcast guest, Fredrik N. Almroth (@almroot) because he’s hacked all the tech giants and more. If you can name it, he’s probably hacked it.