Category: Mix

No. 383 Luxottica confirms Data Breach, META unveils custom AI, NATO's Cyberdefense expands
22
May
2023

No. 383 Luxottica confirms Data Breach, META unveils custom AI, NATO’s Cyberdefense expands

*|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|* *|END:INTERESTED|* *|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|**|ELSE:|* *|END:INTERESTED|* Unsupervised Learning is a Security, AI, and Meaning-focused…

What to Look For in a Penetration Testing Company
22
May
2023

Q&A with Faye Francy: How Auto-ISAC Puts Security in the Driver’s Seat

Faye Francy is executive director of Auto-ISAC, an industry-operated organization created to enhance cybersecurity awareness and collaboration across the global…

Vulnerabilities - Detectify Blog
22
May
2023

GUIDE: The false positive report process

My name is Linus Särud. I’m a Detectify Security Researcher and responsible for incoming support emails. Going forward, we will…

How does Pentesting fit into your overall security strategy?
22
May
2023

h1-202 CTF Winners Announced (and links to write-ups)

Thanks to all of you who participated in the h1-202 CTF!  We had a lot of fun building it and…

New vulnerability findings: Joomla, JBoss, Jenkins and others!
22
May
2023

New vulnerability findings: Joomla, JBoss, Jenkins and others!

During the past month, a great deal has happened in the web security landscape, and we have added a ton…

There is no room for racism or inequality here.
22
May
2023

Calling All “Bureaucracy Hackers” | HackerOne

Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity firm, thinks the government needs more help from hackers….

[Integration] You can now integrate Detectify with HipChat
22
May
2023

[Integration] You can now integrate Detectify with HipChat

HipChat is another one of Detectify’s workflow integrations – there are still many more to come! Set up your integration with…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
22
May
2023

OWASP Top 10 Web Security Risks of 2017 – Flashcards

There’s no such thing as perfectly secure software. All software has vulnerabilities, and it’s up to us to find and…

How to make sure your site is secure before releasing it to the public
22
May
2023

How to make sure your site is secure before releasing it to the public

Most developers today know that one should run unit tests and integration tests before pushing things live. But not all…

Hack for Good: Easily Donate Bounties to WHO’s COVID-19 Response Fund
22
May
2023

GDPR: Let’s kill the FUD

It seems everywhere you look, the talk about GDPR is designed to scare you into action. Fear, uncertainty, and doubt…

The 7 biggest web security news of 2015
22
May
2023

The 7 biggest web security news of 2015

Below, the Detectify team has listed some of the largest security news and breaches of the past year, that have…

h1-415 CTF Winners Announced! | HackerOne
22
May
2023

GitHub Celebrates Four Years of Bug Bounties: Q&A with VP of Security, Shawn Davenport

GitHub celebrated the fourth anniversary of its Security Bug Bounty program and released a comprehensive recap of a record-breaking 2017…