Meet the team: Johanna Ydergård – Scaling the impact of ethical hackers
Head of Crowdsource, Johanna Ydergård, joined Detectify to work on solving the information gap in cybersecurity by scaling the knowledge of ethical hackers and helping…
Head of Crowdsource, Johanna Ydergård, joined Detectify to work on solving the information gap in cybersecurity by scaling the knowledge of ethical hackers and helping…
Evolving the HackerOne Support Experience We are excited to announce that, after many years of using ZenDesk as a Support ticketing tool, HackerOne is moving…
October is Cyber Security Awareness month, and a good time for organizations and anyone who uses the Internet (yes that means everyone) to review security…
Evolving the HackerOne Support Experience We are excited to announce that, after many years of using ZenDesk as a Support ticketing tool, HackerOne is moving…
tl;dr – CVE-2019-11043 PHP-FPM & NGINX RCE was publicly disclosed and a Proof-of-Concept exploit code was made available on GitHub. We received the report from…
What Are the Differences Between a Bug Bounty and CTF? A bug bounty is a financial reward a company offers to ethical hackers for discovering…
Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile ransomware gangs. Malicious activity and…
Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be mindful of. With their business…
HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug bounty and VDPs. Some companies…
Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC News has made clear what…
Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture capital firm Balderton Capital, and…
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was discovered by Cyble Research and…