New vulnerability findings: Joomla, JBoss, Jenkins and others!
During the past month, a great deal has happened in the web security landscape, and we have added a ton of new findings to the…
During the past month, a great deal has happened in the web security landscape, and we have added a ton of new findings to the…
Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity firm, thinks the government needs more help from hackers. Not just with hacking or…
HipChat is another one of Detectify’s workflow integrations – there are still many more to come! Set up your integration with HipChat to add security and…
There’s no such thing as perfectly secure software. All software has vulnerabilities, and it’s up to us to find and fix those vulnerabilities as quickly…
Most developers today know that one should run unit tests and integration tests before pushing things live. But not all developers know how to test…
It seems everywhere you look, the talk about GDPR is designed to scare you into action. Fear, uncertainty, and doubt (FUD) are powerful motivators. Probably…
Below, the Detectify team has listed some of the largest security news and breaches of the past year, that have had a great impact on…
GitHub celebrated the fourth anniversary of its Security Bug Bounty program and released a comprehensive recap of a record-breaking 2017 to mark the moment. To…
Cross-site scripting (XSS) is a type of attack that can be carried out to compromise users of a website. The exploitation of a XSS flaw…
The more the world gets hacked, the more we need hackers. We need white hats. They will find vulnerabilities so we can fix them and…
What do typical websites look like through the eyes of our vulnerability scanner the first time they are tested? How does that picture change over time?…
Just over two years ago, General Motors became the first major automaker to launch a public vulnerability disclosure program (VDP). Its purpose? To protect its…