Category: Mix

Intigriti insights into latest beg bounty scam
27
Mar
2025

Intigriti insights into latest beg bounty scam

The Intigriti team have recently observed an abuse scenario, trending across the industry, where malicious actors are posing as legitimate…

The Hidden Risks Lurking in Your Business Logic
27
Mar
2025

The Hidden Risks Lurking in Your Business Logic

Modern organizations are becoming increasingly reliant on agentic AI, and for good reason: AI agents can dramatically improve efficiency and…

How AI Agents and APIs Can Leak Sensitive Data
19
Mar
2025

How AI Agents and APIs Can Leak Sensitive Data

Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to…

DNS is the center of the modern attack surface - are you protecting all levels?
18
Mar
2025

DNS is the center of the modern attack surface – are you protecting all levels?

If you are a mature organization, you might manage an external IP block of 65,000 IP addresses (equivalent to a…

thinking-coding
17
Mar
2025

Coding is Thinking | Daniel Miessler

We can’t stop learning fundamentals just because tech can do them February 28, 2025 Not learning to code just because…

Access control vulnerability in the retail industry. Cross-Site Scripting (XSS) use case.
13
Mar
2025

Access control vulnerability in the retail industry. Cross-Site Scripting (XSS) use case.

Large-scale operations and the extensive attack surface of the retail industry render it particularly susceptible to cybercrime, on a global…

Burp Everywhere, All Around the World: Bringing AppSec Enthusiasts Together in 2025 | Blog
13
Mar
2025

Burp Everywhere, All Around the World: Bringing AppSec Enthusiasts Together in 2025 | Blog

Amelia Coen | 13 March 2025 at 08:49 UTC Security is a team sport. Whether you’re a pentester, bug bounty…

Behind the Scenes of Burp AI: How we built it, and what's next | Blog
12
Mar
2025

Behind the Scenes of Burp AI: How we built it, and what’s next | Blog

Katie Warren | 12 March 2025 at 13:30 UTC Why now? Artificial intelligence is rapidly transforming industries, and security testing…

A complete guide to exploiting advanced XXE vulnerabilities
11
Mar
2025

A complete guide to exploiting advanced XXE vulnerabilities

XML External Entity (XXE) vulnerabilities are one of the most overlooked yet impactful vulnerabilities in modern web applications. Although they’ve…

Introducing Alfred for fully autonomous AI-built vulnerability assessments
10
Mar
2025

Introducing Alfred for fully autonomous AI-built vulnerability assessments

We are excited to announce Detectify Alfred, a revolutionary system that uses AI to completely autonomously collect and prioritize threat…

A complete guide to exploiting advanced SSRF vulnerabilities
05
Mar
2025

A complete guide to exploiting advanced SSRF vulnerabilities

SSRF—short for Server-Side Request Forgery—vulnerabilities are amongst one of the most impactful web security vulnerabilities. Even though they are less…

API Specifications: Why, When, and How to Enforce Them
04
Mar
2025

API Specifications: Why, When, and How to Enforce Them

APIs facilitate communication between different software applications and power a wide range of everyday digital experiences, from weather apps to…