Category: Mix

30
Apr
2023

ANNOUNCING HACK THE ARMY 3.0 RESULTS: A CONVERSATION WITH DEFENSE DIGITAL SERVICE, U.S. ARMY, AND HACK THE ARMY 3.0’S TOP HACKER

Five years after the Defense Digital Service (DDS) launched the first-ever U.S. federal government bug bounty Challenge, we’re pleased to…

Meet the Team: Emelie Andersson - Building a fast-flying sales team
30
Apr
2023

Meet the Team: Emelie Andersson – Building a fast-flying sales team

Swedish west coast native Emelie Andersson moved to the other side of the country 6 years ago to pursue a…

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot
30
Apr
2023

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite…

Introducing Asset Inventory: stay on top of your web asset security
30
Apr
2023

Introducing Asset Inventory: stay on top of your web asset security

Good security starts with knowing your web assets. To enable transparency over your tech stack, we have released Asset Inventory,…

30
Apr
2023

How Hackers Can Help Reduce Your Organization’s Application Risk on AWS

HackerOne recently hosted AWS and a panel of expert ethical hackers to discuss how Server-Side Request Forgery (SSRF) vulnerabilities and cloud misconfiguration are ripe…

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet
30
Apr
2023

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet

Pulse Secure and Fortinet have announced advisories detailing a critical vulnerability found that enables an unauthenticated user to conduct file…

30
Apr
2023

Citrix’s Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology and in its approach to…

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN
30
Apr
2023

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN

Detectify Crowdsource hacker, Alyssa Herrera, is a full-time bug bounty hacker and web application security researcher who works to protect…

30
Apr
2023

HOW HACKERONE AND GITHUB NOW WORK BETTER TOGETHER

Developers need to bring security into their workflows without pivoting to separate security tools to get vulnerability information. HackerOne has created an…

How does Detectify handle 0-days
30
Apr
2023

How Detectify handles Zero-Day submissions 

Finding a zero-day (0-day) is probably one of the best feelings in the world for a hacker, and sometimes we…

What is Vulnerability Scanning? [And How to Do It Right]
30
Apr
2023

What is Vulnerability Scanning? [And How to Do It Right]

Wondering what vulnerability scanning is? We will explain how it works, why you need to do it, and how to…

Karim tells us why he choose firefox
30
Apr
2023

Karim Rahal: Security Features of Firefox

Karim Rahal, Detectify Crowdsource hacker, is a 17-year-old web-hacker who has been hacking for the greater part of his teenager…