Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Weekly Update 414

published on 2024-08-25 05:28:48 UTC by Troy Hunt
Content:

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

Weekly Update 414

This is such a significant week for us, to finally have Stefan join us as a proper employee at HIBP. When you start out as a pet project, you never really consider yourself a "proper" employee because, well, it's just you mucking around. And then when Charlotte started "officially" working for HIBP a few years ago, well, that's my wife helping me out. To have someone whose sole purpose it is to write code that makes this thing tick and build all sorts of amazing new features expands our capacity to actually produce stuff many times over. I use that term "actually produce stuff" because it was precious little time I had to do this, given all the things involved in running HIBP. It's an exciting time for all three of us now 😊

Weekly Update 414
Weekly Update 414
Weekly Update 414
Weekly Update 414

References

  1. Sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.
  2. Finally, we have a proper employee at HIBP! (we announced Stefan joining us a few months ago, and now he's finally here)
  3. FlokiNET gave mSpy's takedown request the finger (I get them not wanting to cow-tow to an organisation of that nature, but I also don't like seeing troves of personal info floating around)
  4. Meanwhile, mSpy has stuck with their existing blog post about how safe the service is (c'mon guys, seriously...)
  5. Tracki: You don't spy software when you have spy hardware (but they're pretty much cut from the same cloth as mSpy)
  6. Bounty begger 1: you have no XFO header (and then his PoC didn't work... because there's a frame ancestors CSP)
  7. Bounty begger 2: can't consistently spell his own name, but has found a "dangerous vulnerability" (which he almost certainly hasn't)
Article: Weekly Update 414 - published 3 months ago.

https://www.troyhunt.com/weekly-update-414/   
Published: 2024 08 25 05:28:48
Received: 2024 08 25 05:37:12
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Views: 8

Custom HTML Block

Click to Open Code Editor