Author: Cybernoz
What is the Difference Between Bug Bounties and Penetration Testing? Organizations offer ongoing bug bounties to freelance ethical hackers to discover…
Head of Crowdsource, Johanna Ydergård, joined Detectify to work on solving the information gap in cybersecurity by scaling the knowledge…
Evolving the HackerOne Support Experience We are excited to announce that, after many years of using ZenDesk as a Support…
October is Cyber Security Awareness month, and a good time for organizations and anyone who uses the Internet (yes that…
Evolving the HackerOne Support Experience We are excited to announce that, after many years of using ZenDesk as a Support…
tl;dr – CVE-2019-11043 PHP-FPM & NGINX RCE was publicly disclosed and a Proof-of-Concept exploit code was made available on GitHub….
What Are the Differences Between a Bug Bounty and CTF? A bug bounty is a financial reward a company offers…
Last year Detectify announced that we were AWS Technology Partners which meant that getting started with Detectify was made easier….
Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile…
Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be…
HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug…
Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC…