Category: Mix

What Are Bug Bounties? How Do They Work? [With Examples]
29
Apr
2023

What Are Bug Bounties? How Do They Work? [With Examples]

How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…

Guest blog: streaak - my recon techniques from 2019
29
Apr
2023

Guest blog: streaak – my recon techniques from 2019

Detectify Crowdsource hacker Akhil George, aka streaak, is a full-time student who chases bug bounties during his free time. His…

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action
29
Apr
2023

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into…

Detectify
29
Apr
2023

Web security trends to watch for 2020

What are web security trends for 2020? This year we anticipate the build-up of a new security market category, growing…

What We Can Learn From Recent Ransomware Attacks 
29
Apr
2023

What We Can Learn From Recent Ransomware Attacks 

Earlier this month, software vendor Kaseya made headlines when a vulnerability in its Virtual System Administrator (VSA) software led to…

M. Loewinger, Smartbear: “Each product has a DevOps lead who manages Detectify and all its findings”
29
Apr
2023

M. Loewinger, Smartbear: “Each product has a DevOps lead who manages Detectify and all its findings”

Detectify user story: Smartbear offers automated software testing solutions that help development and testing teams ensure quality throughout the software…

miessler-post-llm-software-ai
29
Apr
2023

Pre and Post-LLM Software – Daniel Miessler

If you’re not transitioning your software and business to the post-LLM model, you’ll be replaced by someone who has Created/Updated:…

Vulnerability Assessment I A Complete Guide
29
Apr
2023

Vulnerability Assessment I A Complete Guide

Are you wondering about vulnerability assessments? We give a full explanation of what vulnerability assessments are, how they work, and…

Web security trends 2020 from 3 security leaders
29
Apr
2023

Web security trends 2020 from 3 security leaders

In part 1 of web security trends 2020, we discussed the rise of Crowdsourced Security and the ever-changing attack surface….

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham
29
Apr
2023

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham

The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling his security team with the…

Top 12 tips every pentester should know
28
Apr
2023

Top 12 tips every pentester should know

In 2020, both big and small companies alike are embracing pen-testing as a solution to ensure the quality and availability…

Hyatt's Bug Bounty Program Update: Q&A with Senior Analyst Robert Lowery
28
Apr
2023

Hyatt’s Bug Bounty Program Update: Q&A with Senior Analyst Robert Lowery

Q: Tell us who you are. I’m Robert Lowery, Senior Analyst at Hyatt. I’m part of the Vulnerability Management team,…