Category: Mix
Some know him by his hacker handle, TomNomNom. UK-native Tom Hudson started at Detectify as a Senior Security Researcher, and…
Who is DC3’s DCISE? Krystal Covey: The Defense Collaborative Information Sharing Environment (DCISE) is the operational hub for the DOD’s…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings,…
How Can You Use the Integration? This new integration reduces the manual processes of comparing and taking action on vulnerability…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…
What is your role as an ambassador? 🌎 As an ambassador, I aim to foster a bug bounty community in…
HTTP request smuggling is increasingly exploited by hackers in the wild and in bug bounty programs. This post will explain…
Today HackerOne announced new capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…
How DeFi Expands Cryptocurrency One of the main advantages of cryptocurrency is its privacy and accessibility. Users don’t need…
How does Detectify Crowdsource get the most skilled ethical hackers of the world to come together and have as broad…
What Is a Vulnerability Assessment? A vulnerability assessment continuously scans networks and applications to identify new and existing security flaws….