Our latest blog posts

Could your baby monitor be unsafe and unsecured?
Could your baby monitor be unsafe and unsecured?
The SafetyDetectives cybersecurity team has discovered a vulnerability affecting baby monitors, provoked by their misapplication/misconfiguration, which provides potentially harmful parties with unauthorized access to each camera’...
Q&A With GK8
Q&A With GK8
Safety Detectives: Please share your company background, how you got started, and your mission. GK8: GK8 was founded by elite Israeli cyber intelligence veterans who previously protected the nation’s strategic assets, reporting...
Interview With Adrian Furtuna – Pentest-Tools
Interview With Adrian Furtuna – Pentest-Tools
With thanks to Adrian Furtuna, Founder and CEO of Pentest-Tools.com, Aviva Zacks of Safety Detective found out why he was his company's first customer. Safety Detectives: What motivated you to start Pentest-Tools.com? Adrian...
Interview With Reinard Mortlock – Livex
Interview With Reinard Mortlock – Livex
Aviva Zacks of Safety Detective had a wonderful time interviewing Reinard Mortlock, CEO of Livex. She found out how his company is helping keep South Africa safe from hackers. Safety Detective: What got you interested in cybers...
Cyber Insurance Made Easy: Q/A With Asaf Lifshitz Of Sayata
Cyber Insurance Made Easy: Q/A With Asaf Lifshitz Of Sayata
Cyber threats are a problem for businesses of all sizes, but they can be particularly dangerous for small businesses that are not always able to cover the losses caused by cyberattacks. Moreover, large Fortune companies can aff...
Security Information and Event Management (SIEM): Q/A with LogRhythm
Security Information and Event Management (SIEM): Q/A with LogRhythm
Cyber-attacks are on the rise and so is the resulting damage, and no one is 100% safe from, as attackers are constantly improving their schemes and tools. All kinds of organizations are implementing several different cybersecur...
Phishing Attacks: A Survival Guide by Cofense
Phishing Attacks: A Survival Guide by Cofense
Hackers are continuously coming up with new forms of malicious emails and schemes, so even using antivirus software with phishing protection is not enough to save you from losing sensitive information, like bank accounts credentia...
Protect Your Online Identity With These Expert Tips By Idenhaus Consulting
Protect Your Online Identity With These Expert Tips By Idenhaus Consulting
It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk In fact, organizations embracing digital transfor...
How To Build Secure Mobile Applications: Expert Tips by Security Compass
How To Build Secure Mobile Applications: Expert Tips by Security Compass
In the era of mobile communication, application security is a priority that developers simply can’t ignore, if they want to avoid losing money (a LOT of money) and trust from their customers. Therefore, every software company m...
Artificial Intelligence and Cybersecurity: Q/A With Juniper Networks
Artificial Intelligence and Cybersecurity: Q/A With Juniper Networks
In this interview we are going to talk with Drew Simonis, Chief Information Security Officer at Juniper, a multi-awarded company developing industry-leading software powered by artificial intelligence that helps Fortune 500 firms,...