Vulnerabilities – Detectify Blog
The internet is awesome, but it can also be a pretty dangerous place. This is why we at Detectify are always on the lookout for…
The internet is awesome, but it can also be a pretty dangerous place. This is why we at Detectify are always on the lookout for…
If you’re a new hacker on HackerOne, starting from scratch can appear daunting. Perhaps you’ve looked at the long list of awesome hackers on HackerOne,…
Detectify introduces permissions rights to Detectify teams. As a team administrator, you are now able to grant users two different kinds of access rights per…
GDPR compliance is so relevant today because, well, it comes into effect starting tomorrow, May 25, 2018. The time for talking about how to prepare…
Detectify’s knowledge advisor Frans Rosén has worked with security research for many years, and is a top ranked participant of bug bounty programs, receiving the…
Since January, thousands of hackers have expressed their enthusiasm for the first Hacker101 content drop (almost 80,000 total video views and more than 8,800 stars…
There are all kinds of apps on Facebook – quizzes, games and corporate sweepstakes. But it might be a good idea to keep track of…
When looking for a model to inform your own security posture, the Department of Defense would be a good place to look. Not only were…
You might have noticed that Google occasionally flags some websites with a “This site may be hacked”-flag or a “This site may harm your computer”-flag.…
GDPR is finally upon us. The onslaught of “we’ve updated our privacy policy” emails to your inbox should have been an indicator…as well as the…
Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep up to date on Joomla…
The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August 12! HackerOne 1337 will be…