Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

External Attack Surface Management (EASM): What it is and what it isn't

The External Attack Surface Management market category only emerged in mid-2021 but is already seeing significant product development and evolution growth. This e-book demystifies some of the information around EASM - especially its relation to other attack surface management (ASM) product categories and how product security teams can leverage EASM to go beyond asset discovery and inventory.

Hack the Box Business CTF 2022: Challenge 1 - PhishTale

Recently, Bulletproof’s pen testers participated in the Hack the Box Business CTF 2022 competition. This was a global InfoSec contest that pitted cyber security teams against one another in a series of hacking challenges, based on real-world vulnerabilities. There were 8 categories which included challenges of varying skill levels for teams to apply their hacking expertise to ‘capture the flag’.

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

San Francisco-based dYdX, a widely used decentralized crypto exchange with roughly $1 billion in daily trades, has had its NPM account hacked in a software supply chain attack that was likely aimed at gaining access to the company’s production systems. The company, founded by ex-Coinbase and Uber engineer Antonio Juliano, dYdX has raised a total of $87 million in funding over 4 rounds and is backed by some powerhouse investors, including Paradigm, a16z, and Polychain. Here is what we know.

Hackers Tampering with QR Codes To Steal Money - FBI Warns!!

From making contactless payments on mobile payment apps and viewing paperless menus to contact tracing Covid-19 cases, QR (Quick Response) codes are everywhere and in popular usage. This ubiquity and convenience have also made QR codes popular and lucrative targets for cybercriminals who leverage malicious QR codes to illegally gain access to confidential information, spread malware, or steal money.