Category: Mix
Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s…
Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs…
To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual…
On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and…
For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to…
The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters that are redefining practices and…
People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head…
Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as a one-and-done annual exercise. You…
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case…
Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past…
Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to…
The best way to prevent getting hacked is to try to get hacked. Paradoxical as this may sound, evidence shows…




![[Integration] You can now integrate Detectify with Trello [Integration] You can now integrate Detectify with Trello](https://image.cybernoz.com/wp-content/uploads/2023/05/Integration-You-can-now-integrate-Detectify-with-Trello-300x270.png)


![What is an SQL Injection and how do you fix it? [Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution](https://image.cybernoz.com/wp-content/uploads/2023/05/Alert-New-Magento-Vulnerability-Unauthenticated-Remote-Code-Execution.png)

