Did you know that nine out of 10 companies detected software supply chain risks in the past 12 months? The increase in the number of dependencies in a supply chain has extended the attack surface for adversaries. It has also caused threat actors to shift their focus from the downstream chain affecting just end users to the upstream chain affecting vendors, customers, and end users alike.
This blog summarizes how the Detectify tool has evolved over 2023, alongside other significant highlights, such as analyst mentions and major developments to Detectify.com, Detectify Blog, and Detectify Labs properties.
Metadata is a powerful tool for organizing and managing digital assets, but as digital content volumes continue to grow, manual tagging becomes increasingly time-consuming and inefficient. Manual tagging can lead to inconsistent metadata, making it a challenge to search and organize content effectively.
GDPR, or the General Data Protection Regulation, is a data privacy law that many businesses around the world need to comply with. If you’re operating a business or managing a website, it’s important to know how the law applies to you and your website’s data collection processes. In this blog post, we’ll answer some fundamental questions about GDPR and provide guidance on how to get your website GDPR compliant.
On December 18th, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) issued an urgent advisory to highlight the ongoing malicious activities being conducted by the Play ransomware group.