Date | Title | Description |
29.10.2024 | The Thrill of the Hunt: Navigating the Bug Bounty Landscape | In the digital age, vulnerabilities lurk in every corner of the internet. Bug bounty programs are the modern-day treasure hunts, where ethical hackers seek out these hidden flaws for rewards. This article dives into the world of bug hunting... |
29.10.2024 | Вознаграждение в $20 300 за 200 часов хакерского марафона | Вернемся к июлю 2023 года: вместе с Мохаммадом Никуи мы решили посвятить 100 часов работе над публичной программой Bug Bounty на платформе BugCrowd. Мы занимались ею неполный рабочий день, уделяя по 4–6 часов ежедневно. Выбрали программу от... |
03.10.2024 | The Digital Battlefield: Cloudflare's Triumph Over DDoS Attacks | In the ever-evolving landscape of cybersecurity, the stakes are high. Companies are constantly under siege from cybercriminals. Recently, Cloudflare, a leader in cloud cybersecurity, showcased its prowess by thwarting a massive DDoS attack.... |
03.10.2024 | Cloudflare предотвратила масштабную DDoS-атаку мощностью 3,8 Тбит/с | Компания Cloudflare отчиталась, что её системы защиты сумели предотвратить масштабную DDoS-атаку мощностью 3,8 Тбит/с — самую крупную из когда-либо публично раскрытых какой-либо организацией. Инфраструктура компании справилась с этой пробле... |
06.08.2024 | Censys unveils community forum for security teams | Censys has announced the launch of a new community forum to enable security teams to share knowledge and learn from each other. This initiative seeks to provide a collaborative environment where security professionals can discuss threat hun... |
08.07.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — критическая уязвимость в сервере OpenSSH, атаки на файловые серверы HTTP File Server, получение конфиденциальных данных через технологию Passkey, вредоносный домен Polyfill.io, вредоносное ПО в установщиках популярных прог... |
03.07.2024 | 384,000 sites pull code from sketchy code library recently bought by Chinese firm | Enlarge
Getty Images reader comments 63
More than 384,000 websites are linking to a site that was caught last week performing a supply-chain attack that redirected visitors to malicious sites, researchers said.
For years, the JavaScript cod... |
26.06.2024 | Critical MOVEit vulnerability puts huge swaths of the Internet at severe risk | Enlarge reader comments 36
A critical vulnerability recently discovered in a widely used piece of software is putting huge swaths of the Internet at risk of devastating hacks, and attackers have already begun actively trying to exploit it i... |
18.06.2024 | UK gym chain Total Fitness leaks personal images online | According to researcher Jeremiah Fowler, the database, which was publicly accessible without a password, contained 474,000 images of men, women and children. The unprotected database, totalling 47.7GB, also included identity documents, bank... |
14.06.2024 | Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating | Enlarge
Getty Images reader comments 49
Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability in the PHP programming language that executes malicious code on web servers, security researchers said.
As of Thursday, In... |
30.05.2024 | Windstream ISP Malware: At Least 600,000 Routers Stop Working in Just 72 Hours, Users Lose Access | By Joseph Henry
Published May 30, 2024 1:10PM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Numerous subscribers of Windstream, an Internet Service Provider (ISP), reported that ... |
22.04.2024 | Как бы я взломал Рунет? | В сегодняшней статье мы поделимся результатами более чем годового проекта СайберОК, посвященного анализу защищенности периметра Рунета.
Исследование содержит в себе подробную статистику по некоторым кейсам, аналитические выводы, а также кру... |
27.06.2023 | Threat landscape is getting worse say CISOs | A new study of over 200 CISOs and senior security leaders at organizations with over 5,000 employees shows that 93 percent have suffered at least one cyberattack in the last year and all of them think the security landscape is worsening.
Th... |
27.05.2023 | A BitTorrent Client WebUI Shouldn’t Be Shared With The Entire Internet | The word ‘open’ in a connected world can be something positive. Open source, for example, or open library. On other occasions the opposite can be true; unnecessary ports left open on a router springs to mind.
For millions of people using de... |
19.04.2023 | Misconfigurations leave internet-facing servers open to attack | Issues with server configuration remain a major problem. Researchers at Censys have identified over 8,000 hosts on the internet misconfigured to expose open directories.
These directories contain potentially sensitive data, such as database... |
06.02.2023 | Security Week 2306: критическая уязвимость в устройствах QNAP | 30 января компания QNAP выпустила обновление для операционных систем QTS и QuTS Hero, закрывающее серьезную уязвимость, которая может привести к получению полного контроля над устройством. ОС QTS и QuTS Hero используются соответственно в ус... |
01.02.2023 | Up to 29,000 unpatched QNAP storage devices are sitting ducks to ransomware | reader comments 52 with 0 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
As many as 29,000 network storage devices manufactured by Taiwan-based QNAP are vulnerable to hacks that are easy to carry o... |
23.01.2023 | The internet of every damn thing | Image: bakhtiarzein/Adobe Stock
The Internet of Things is loosely defined as devices other than a computer that can connect to the internet, and these days, that includes everything from a Fitbit to a fridge.
Much like the internet itself, ... |
22.12.2022 | Создаем кибер-разведку в компании на основе OSINT | Привет, Хабр!
Каждый день приходят новости, что ту или иную компанию взломали хакеры, получили дампы или зашифровали данные. Защищаться от киберугроз, выстраивая целую инфраструктуру из всевозможных средств защиты, хорошо и нужно, но никогд... |
05.12.2022 | Balancing the risks and benefits of an online presence [Q&A] | The widespread use of digital platforms allows businesses to expand, but at the same time a growing internet presence can put organizations at risk in ways they cannot plan for.
We talked to Censys' data scientist, Emily Austin about the co... |
07.09.2022 | New wave of data-destroying ransomware attacks hits QNAP NAS devices | Enlarge
Aurich Lawson reader comments 45 with 36 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Network hardware-maker QNAP is urging customers to update their network-attached storage devices imme... |
14.04.2022 | Wormable Windows RPC bug warning issued | Over a million systems connected to the Internet could be vulnerable to a wormable or self-spreading vulnerability in the Windows Remote Procedure Call protocol, researchers warn.
The bug can be abused for remote code execution at high priv... |
27.01.2022 | IoT search engine Censys secures $35M — and a new CEO | Censys, a search engine for Internet of Things devices and internet assets, has secured $35 million in Series B funding and a new CEO.
The internet security startup, based in Michigan tech hub Ann Arbor, which started as an open source rese... |
27.01.2022 | Censys Closes $35M Series B Funding Round | Brad Brooks, CEO at Censys
Censys, an Ann Arbor,, Mich.-based provider of continuous attack surface management solutions, completed a $35m Series B funding.
The round was led by Intel Capital with participation from previous investors Googl... |
16.12.2021 | OSINT или разведка по открытым источникам | Поиск по открытым источникам — это методология сбора и анализа данных, находящихся в открытом доступе, для получения дополнительной информации о цели.
В данной статье расскажем о том, какими методами и средствами можно собирать информацию и... |
17.09.2021 | Microsoft переложила закрытие уязвимости OMIGOD в Azure на пользователей | Пользователи Microsoft Azure, использующие виртуальные машины Linux в облаке, должны принять меры, чтобы защитить себя от уязвимостей OMIGOD внутри платформы Open Management Infrastructure (OMI).
Microsoft опубликовала патчи 14 сентября. На... |
26.08.2021 | Women's Equality Day 2021: Censys surpasses tech industry benchmarks by double for gender, celebrates wins | |
17.08.2021 | Censys Wins Startup Weekly's 2021 Diverse & Inclusive Employer Award | |
30.06.2021 | 5 lines of code allowed attackers to wipe tons of data from popular hard drive | Western Digital My Book Live was hit with an attack last week that led to countless drives being factory reset, resulting in petabytes of lost data. Originally, reports showed that the main attack exploited a security vulnerability from 201... |
30.06.2021 | Hackers exploited 0-day, not 2018 bug, to mass-wipe My Book Live devices [Updated] | Enlarge
Getty Images reader comments 346 with 219 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Update 6/29/2021, 9:00 PM: Western Digital has published an update that says the company will provid... |
30.06.2021 | Hackers apagam HDs Western Digital remotamente usando falhas não corrigidas | Imagine acessar o seu HD externo e descobrir que, de uma hora para outra, todos os dados armazenados ali sumiram. Muitos usuários das linhas My Book Live e My Book Live Duo, da Western Digital, passaram por isso recentemente. Não foi por ac... |
04.06.2021 | Censys Announces Censys Search 2.0: A Brand New Scanning Engine that Finds Tremendously More Services on Risky Non-Standard Ports | |
13.08.2020 | Censys Raises $15.5M in Series A Funding | Censys, an Ann Arbor, Mi.-based search engine for internet devices, raised $15.5m in Series A funding.
The round was led by GV and Decibel with participation from Greylock.
The company intends to use the funds to expand operations, expandin... |
05.08.2020 | Censys raises $15.5 million to bring attack surface management to more companies | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Censys, a cybersecurity startup that provides an ... |
05.08.2020 | Censys: $15.5 Million Funding And New Scan Engine | Censys — a leading Ann Arbor, Michigan-based cybersecurity company that offers Internet-wide continuous visibility and real-time risk assessment to help businesses monitor their constantly evolving attack surfaces and vulnerabilities — anno... |
05.08.2020 | Censys, a search engine for internet devices, raises $15.5M Series A | Internet device search engine Censys is one of the biggest search engines you’ve probably never heard of.
If Google is the search engine for finding information sitting on the web, Censys is the search engine for finding internet devices, l... |
05.08.2020 | Censys raises $15.5 million to bring attack surface management to more companies | Censys, a cybersecurity startup that provides an attack surface management platform to high-profile companies like Google, has raised $15.5 million in a series A round of funding coled by Google’s GV and Decibel, with participation from Gre... |
29.07.2020 | How to protect your website’s database from hackers | Image: iStock/Vladimir_Timofeev
Website databases contain a treasure trove of confidential information, including usernames, email addresses, phone numbers, and passwords (albeit encrypted passwords…hopefully). Such databases are a tempting... |
18.07.2019 | Why Michigan Could Become a Startup Powerhouse | The unicorns in Michigan demonstrate a fertile startup ecosystem with unlimited opportunities. A couple weeks ago, StockX became the state’s newest in a quickly-growing cohort of unicorns, which includes two other startups that also earned ... |
16.07.2019 | Why Michigan Could Become A Startup Powerhouse | With unicorn Rivian and several other emerging mobility startups, Michigan is poised to play a key... [+] role in the future of automotive innovation. Josh Garcia |
30.06.2019 | How Startup Equity Can Impact the Average Tech Employee | When the first startup I worked for was acquired in 2010, my equity—which I did not have full appreciation of up until that point—cashed out on the lower end of the four-figure range. That is not the level of value that we tend to get excit... |
28.11.2018 | Ann Arbor-Based Cybersecurity Company Censys Raises $2.6 Million | Censys, an Ann Arbor, Michigan-based cybersecurity startup that helps companies find where data may be exposed, announced that it has raised $2.6 million in seed round of funding led by GV (formerly known as Google Ventures), Greylock Partn... |
28.11.2018 | Term Sheet — Wednesday, November 28 | NEWS ON THE BLOCK(CHAIN)
Good morning, Term Sheet readers.
Paid Content Securing the enterprise without boundaries From ExtraHop
This is the first tokenized REIT in the U.S. The owner, Convexity Properties, aims to raise $20 million with th... |
27.11.2018 | Censys Raises $2.6M in Seed Funding | Censys, Inc., an Ann Arbor, Mich.-based provider of Internet security data, raised $2.6M in seed funding.
The round was led by GV and Greylock Partners, with participation from a number of angel investors.
The company intends to use the fun... |
27.11.2018 | Censys, a search engine for internet-connected devices, raises $2.6 million led by GV and Greylock | Ann Arbor-based cybersecurity startup Censys today announced that it has raised a $2.6 million seed round led by GV and Greylock. The funding will be used as Censys, which just launched as a commercial company last year, seeks to collect mo... |
23.10.2018 | Two new supply-chain attacks come to light in less than a week | Enlarge
Brian Smithson / Flickr reader comments 46 with 30 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Most of us don’t think twice about installing software or updates from a trusted developer.... |
11.09.2018 | 280 mil roteadores foram invadidos para minerar criptomoeda, a maioria no Brasil | Mais de 280 mil roteadores da MikroTik estão infectados com um minerador de criptomoeda. A mesma falha de segurança está sendo usada em diferentes ataques, que atingem principalmente o Brasil. Ela já foi corrigida em abril, mas muita gente ... |
16.08.2018 | The Midwest’s Best-Kept Secret is its Vibrant Cybersecurity Community | Cisco’s announcement this month that it intends to acquire Ann Arbor-based cybersecurity startup Duo Security for a whopping $2.35 billion shines a light on the Midwest’s increasing strength in the cybersecurity space. Given that Ann Arbor ... |
14.08.2018 | The Midwest’s best-kept secret is its vibrant cybersecurity community | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cisco’s announcement this month that it intends t... |
14.08.2018 | The Midwest’s best-kept secret is its vibrant cybersecurity community | Cisco’s announcement this month that it intends to acquire Ann Arbor-based cybersecurity startup Duo Security for a whopping $2.35 billion shines a light on the Midwest’s increasing strength in the cybersecurity space. Given that Ann Arbor ... |
16.07.2018 | Why Michigan is the Midwest’s Most Improved Startup Community | PitchBook’s recent report on the 3 critical factors for a strong venture ecosystem — density, resources, and talent — led me on a quest to find where, beyond the typical major cities discussed in the venture world, we see these factors crys... |
10.07.2018 | Why Michigan is the Midwest’s most improved startup community | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
PitchBook’s recent report on the 3 critical facto... |
10.07.2018 | Why Michigan is the Midwest’s most improved startup community | PitchBook’s recent report on the 3 critical factors for a strong venture ecosystem — density, resources, and talent — led me on a quest to find where, beyond the typical major cities discussed in the venture world, we see these factors crys... |
29.02.2016 | Largely undetected Mac malware suggests disgraced HackingTeam has returned | Enlarge
Patrick Wardle reader comments 63 with 50 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discov... |
- | Apple's newest homegrown chips present a fresh challenge to Microsoft's Windows business | Apple is positioned to gain PC market share from Microsoft Windows after announcing MacBook laptops with the next-generation M2 chips.
Adobe, Microsoft and other app developers have been making their software compatible with Apple silicon, ... |