Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2020

Detectify Crowdsource - Not Your Average Bug Bounty Platform

How does Detectify Crowdsource get the most skilled ethical hackers of the world to come together and have as broad an impact as possible? The answer – a bug bounty program, but not in the traditional way. I am Carolin Solskär, Detectify Crowdsource Community Manager and I work closely with our ethical hackers to make sure we maintain an awesome experience for all our members with the shared goal to make the Internet more secure.

Outpost24 webinar: Improve Your Organization's Security With Red Teaming

Security assessments can be performed in many ways, depending on your organization’s maturity level and goals. Whilst vulnerability scanning can help to identify security flaws on a broader scope and penetration testing can conclude the risk level of vulnerabilities discovered, if you need to understand the full picture of your organization’s security awareness and readiness, a scenario-based Red Teaming Assessment (RTA) is the best way to assess the effectiveness of your defence mechanism from a hacker’s view.

How were we Hacked? Part 2

I wrote recently about how Office 365 accounts are most commonly breached - through leaked credentials. This covered the different ways that credentials can be breached through various factors, including many human misconceptions and failures can be mixed with other internal and external forces. This article is going to cover the anatomy of what happens after the hacker has gained access. There are many things a hacker may be seeking including information extraction or means of corporate espionage.