Category: Mix

CWE (Common Weakness Enumeration) and the CWE Top 25 Explained
25
Apr
2023

CWE (Common Weakness Enumeration) and the CWE Top 25 Explained

Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities….

Detectify security updates for December 28
25
Apr
2023

Detectify security updates for December 28

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

alfred-safari
25
Apr
2023

Using Custom Searches in Safari (in 2022)

Created/Updated: September 25, 2022 I’ve just started using Safari again after being on Chrome for a while, and one of…

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights
25
Apr
2023

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights

For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest database of…

Top 10 Most Critical CVEs Added in 2020
25
Apr
2023

Top 10 Most Critical CVEs Added in 2020

Our global community of hand-picked Detectify Crowdsource ethical hackers are the reason we are able to automate security research so…

2022-apple-products
25
Apr
2023

5 Things I’m Still Waiting for With the iPhone, Apple Watch, and AirPods

Created/Updated: September 25, 2022 I just camped for the new lineup of Apple products, as I have every year since…

Log4Shell: Attack Evolution | HackerOne
25
Apr
2023

Log4Shell: Attack Evolution | HackerOne

For many security teams, the holiday season was spoiled by the challenging remediation of Log4Shell. The affected Log4j software is…

Detectify security updates for January 11
25
Apr
2023

Detectify security updates for January 11

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

google-stadia-graveyard
25
Apr
2023

Stadia is Google’s Product Strategy

Google refuses to invest in solid product strategy and UI/UX, and the results are becoming predictable Created/Updated: October 2, 2022…

New: Burp Suite Enterprise Edition Pay as you scan pricing | Blog
25
Apr
2023

New: Burp Suite Enterprise Edition Pay as you scan pricing | Blog

Matt Atkinson | 25 April 2023 at 14:06 UTC More than 1,000 organizations are using Burp Suite Enterprise Edition to…

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities
25
Apr
2023

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security strategies…

Detectify Co-founder and security researcher Fredrik Nordberg Almroth
25
Apr
2023

Detectify ethical hacker kept the country code domain .cd safe from potential attacks

NEW RESEARCH – On December 30, Fredrik Nordberg Almroth, security researcher and co-founder of Detectify – the Sweden-born cybersecurity company…