The Probely team will, again, organize the security capture the flag (CTF) competitions on this edition of Pixels Camp. The CTF will take place at Pixels Camp, a 3 day non-stop tech event with talks, workshops and a 48 hour programming competition, held in Lisbon, Portugal, which had over 1000 attendees last year. Pixels Camp is organized by Bright Pixel, one of our investors.
Blog / Cybersecurity
SAST has its place, DAST is great at finding the majority of flaws that the bad guys are going to uncover, and IAST offers unique approaches to complex situations. At a minimum, DAST should be your main focus. Step back and consider your application environment, your internal resources and expertise, as well as your budget.
Our CEO and Co-Founder Nuno Loureiro was recently interviewed by Safety Detectives. He talked about our history and goals when we decided to build Probely, and briefly explains what keeps Probely ahead of the competition.
One more year, one more bSidesLisbon, and therefore, one more CTF to be qualified. Being part of team Probely always makes me feel like the fat kid in the school’s football team. There’s a little difference this year, Bruno Barão was not on vacation, so everything would be easier
The fine British Airways are facing is related to a 2018 data breach that affected thousands of customers and compromised data from over 380,000 card payments. The fine was issued due to BA’s failure to comply with GDPR rules. Preventing the breach would not have only avoided the fine (obviously), but it would’ve prevented a much more costly outcome — thousands of dissatisfied customers that lost trust in the brand.
In this article, we propose how to create a modern and secure TLS setup, while maintaining adequate compatibility. Additionally, we provide ready-to-use Terraform examples for a Docker-based nginx reverse proxy setup, with TLS 1.3 support, and Let’s Encrypt automatic certificate renewal, for both Amazon Web Services and Google Cloud Platform.
Cryptojacking is the digital version of it — it’s when the hacker steals your computer’s resources and uses them to harvest cryptocurrency. Mining is only a viable business if the cost of the computing power and electricity required to operate and cool down your systems is significantly lower than the monetary gain you get from mining.
Facebook announced it suffered an attack that affected almost 50 million users. The hack required the chaining of multiple vulnerabilities, being one of them in the “View As” feature, that help users control their privacy by previewing how other users see their profile.
The status quo in the cyber-security industry is that most small businesses can’t afford a security solution, and any attempts to become more secure are either drowned in technical jargon or in distant price-ranges. In order to change the way businesses deal with security, this status quo has to be challenged.