Top 3 takeaways from CIO Trend 2016
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this change is the CIO. The…
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this change is the CIO. The…
Nearly 40 hackers representing 12 countries were in Amsterdam on May 26, 2018 with one focus: hacking Dropbox! Dropbox runs a top public bug bounty…
Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s event Säkerhetsdagen 2016 in Stockholm.…
Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs and reduce the time that…
To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual for people to install and…
On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and mature bug bounty programs on…
For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to your favourite security to-do list.…
The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters that are redefining practices and industries. It was founded in…
People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head for every service you are…
Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as a one-and-done annual exercise. You hire a consultant, they run…
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker…
Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past few months we’ve been maniacally…