Category: Mix

HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution
10
May
2023

HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution

HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected by Cyber Catalyst insurers…

Meet the Hacker: Yasin Soliman "The bug bounty community motivates me hugely"
10
May
2023

Meet the Hacker: Yasin Soliman “The bug bounty community motivates me hugely”

One of our latest Detectify Crowdsource hackers is Yasin Soliman, a bug bounty hunter from UK, who has been passionate…

Slack Increases Bounty Minimums For the Next 90 Days
10
May
2023

How Bug Bounties Help You Shift Left

For many organizations, the days when security acted as a final “check-in” are disappearing faster than the guacamole at a…

New security tests, November 15, 2017: Image Resizer Exposure in .NET
10
May
2023

Newly added security tests, October 4, 2017: WordPress and Magento vulnerabilities

This week’s update brings more WordPress plugin vulnerabilities that Detectify now checks for as well as two Magento security tests. …

Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board
10
May
2023

Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board

CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….

Magento security 101: How to secure your Magento site
10
May
2023

Magento security 101: How to secure your Magento site

Due to its popularity as an e-commerce platform, Magento is an attractive target for hacker attacks, but basic security precautions…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
09
May
2023

Transparency Builds Trust | HackerOne

Someone called it a “breach,” and the world took notice. Here is the story. There is no trust without transparency….

Magento best practices
09
May
2023

Is your Magento store vulnerable? Why it’s time to put security first

Magento is not only interesting for retailers – hackers like to target widely used platforms and the fact that online…

There is no room for racism or inequality here.
09
May
2023

Using Bug Bounty Talent Pools to Attract and Maintain Top Talent

Security leaders today face a complex set of talent challenges—from training on the latest attack vectors, to finding talent with…

Thousands of vulnerable Magento web stores out there
09
May
2023

Thousands of vulnerable Magento web stores out there

We checked 30,000 Magento stores for three publicly available vulnerabilities that are sometimes found in older Magento installations. Despite the…

Scaling & Prioritizing Product Security with Zendesk
09
May
2023

This Season, Give the Gift of Data-Driven Insight

It’s that time of the year again. Time to dig out your wrinkled “No, I can’t fix your computer” t-shirt…

[VIDEO SEMINAR] Magento security from a hacker's perspective
09
May
2023

[VIDEO SEMINAR] Magento security from a hacker’s perspective

Have you ever wondered how a hacker would analyze and attack a Magento website? We picked the brains of two…