Category: Mix

A summer learning list for better security awareness
28
Apr
2023

A summer learning list for better security awareness

It’s soon time for Summer vacation to begin, and we’ve asked our colleagues to share some of their summer learning…

Vulnerability Testing | Best Techniques for Assessing Risks
28
Apr
2023

Vulnerability Testing | Best Techniques for Assessing Risks

What Is Vulnerability Testing? Vulnerability testing, also known as vulnerability assessment, evaluates an entire system to look for security weaknesses…

Common security misconfigurations and remediations
28
Apr
2023

Common security misconfigurations and remediations

A misconfiguration is exactly what it sounds like; something that is wrongly configured. From a security perspective this can be…

Time to Issue Your Own Cyber Executive Order
28
Apr
2023

Time to Issue Your Own Cyber Executive Order

Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more…

Detectify security updates for 13 July
28
Apr
2023

Detectify security updates for 13 July

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help
28
Apr
2023

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Software Supply Chain Attacks Are On the Rise  Because open source component use is widespread in cloud-native application development, software…

Detectify achieves ISO 27001 Certification
28
Apr
2023

Detectify achieves ISO 27001 Certification

The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July…

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security
28
Apr
2023

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security

HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity.  “New and significant attacks related…

Do you trust your cache? – Web Cache Poisoning explained
28
Apr
2023

Do you trust your cache? – Web Cache Poisoning explained

As we are all currently confined to a life at home during the pandemic, it has become more important than…

Vulnerability Remediation | A Step-by-Step Guide
27
Apr
2023

Vulnerability Remediation | A Step-by-Step Guide

  What Is Vulnerability Remediation? Vulnerability remediation is the process of addressing system security weaknesses. The steps include the following:…

Crowdsource Success Story: From an Out-of-Scope Open Redirect to CVE-2020-1323
27
Apr
2023

Crowdsource Success Story: From an Out-of-Scope Open Redirect to CVE-2020-1323

Scope-creeping doesn’t always end up in a 0-day with a CVE assigned, and this was the fortune of Detectify Crowdsource…

Navigating a Safe, Successful Return to Office: 5 Tips for Security Leaders
27
Apr
2023

Navigating a Safe, Successful Return to Office: 5 Tips for Security Leaders

Fortunately, for security leaders and their colleagues in IT charged with executing digital transformations, their relationships with executive management are…