Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Did You Hire a Spy? Risks and Strategies for Securing Remote Workers

In today’s high-stakes digital landscape, hiring remotely requires diligence and vigilance. Trust is important, but verifying that trust is non-negotiable. The consequences of negligence can extend beyond financial loss, affecting national security and the very foundations of an organization. By taking proactive measures, companies can significantly reduce the risk of hiring a spy or becoming a victim of corporate espionage.

The Importance of Identity Threat Detection and Response (ITDR) in 2025

As cyber threats continue to evolve, organizations face a growing challenge: protecting their most critical assets – identities. With identity now at the heart of security strategies, 2025 marks a pivotal year for addressing identity-centric risks, making Identity Threat Detection and Response (ITDR) a vital component of enterprise security.

How Detectify embraces the best of both DAST and ASM

Below, we’ll take a look at how both DAST as a methodology and DAST as a tool relate to what we do at Detectify. More specifically, we’ll explain how Detectify’s solution applies DAST methodology to the full breadth of an attack surface, automating the heck out of application security testing. With these methods, we cover millions of domains before you’ve even had breakfast.

Securing Sensitive Data in Healthcare: Why Privacy and Protection Must Be a Top Priority

Protegrity specializes in protecting sensitive data, a focus we’ve maintained for around 20 years. Our customer base includes many large enterprises, particularly in the healthcare and financial sectors, spanning across the globe. Our clients include some of the most renowned companies worldwide.

Sending billions of daily requests without breaking things with our rate limiter

At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a very high volume of requests to their systems, which brings the potential risk of overloading their servers. Naturally, we addressed this challenge to ensure our testing delivers maximum value to our customers while being conducted safely with our rate limiter.

Inside FunkSec: An Exclusive Interview with a Ransomware Architect

Summary FunkSec is a new ransomware group that came into the spotlight after attacking many sectors around the world. The group runs a data leak site on Tor. Funksec employees conduct double extortion attacks, which means hackers encrypt and exfiltrate data from the victim to extort them for paying ransom to the attackers.

Trust Center: A Comprehensive Guide for Organizations

Most enterprise security teams spend hundreds of hours annually filling security questionnaires and sharing compliance documents with customers. A trust center cuts this down to near zero by putting everything in one place. The concept isn’t new – organizations have long maintained security documentation. However, recent data breaches, stricter regulations, and cloud adoption have transformed an essential requirement into a business driver.

The Evolution of SSE and Its Role in Modern Security Architectures

The cybersecurity landscape has shifted dramatically over the last several years. More and more work takes place outside of the office and in the cloud — in fact, experts expect the cloud market to exceed $676 billion in 2024. It’s not hard to see why. With the cloud, organizations gain unprecedented freedom to work how they want, whether that’s in-office, in one or more cloud environments, or in a hybrid of multiple approaches.

Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection

In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in the malware-as-a-service (MaaS) model and has existed since at least 2022. The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world.