Category: Mix

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
21
May
2023

IT Security FAQ 1: What should you think about when approving an app on Facebook?

There are all kinds of apps on Facebook – quizzes, games and corporate sweepstakes. But it might be a good…

Lawfully Hacked | HackerOne
21
May
2023

Hacker-Powered pen tests at the U.S. Federal Government

When looking for a model to inform your own security posture, the Department of Defense would be a good place…

Your site may be hacked flag
21
May
2023

GUIDE: How to get rid of your ‘This site may be hacked’-flag

You might have noticed that Google occasionally flags some websites with a “This site may be hacked”-flag or a “This…

There is no room for racism or inequality here.
21
May
2023

Hey Startups, Check Your GDPR Progress with this GDPR Checklist

GDPR is finally upon us. The onslaught of “we’ve updated our privacy policy” emails to your inbox should have been…

[Alert] Critical authentication bypass + privilege escalation exploit in Joomla
21
May
2023

Joomla security – Detectify Blog

Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
21
May
2023

Jackpot! The h1-702 2018 CTF is here! Win a Trip to the Biggest Live-hacking Event of 2018

The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August…

Top 3 takeaways from CIO Trend 2016
21
May
2023

Top 3 takeaways from CIO Trend 2016

In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this…

Slack Increases Bounty Minimums For the Next 90 Days
21
May
2023

Live-hacking Dropbox in Amsterdam for H1-3120

Nearly 40 hackers representing 12 countries were in Amsterdam on May 26, 2018 with one focus: hacking Dropbox!  Dropbox runs…

Inside the head of a white hat hacker
21
May
2023

Inside the head of a white hat hacker

Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s…

Q&A with Brian Neely, CIO & CISO of AMERICAN SYSTEMS
21
May
2023

Advanced triggers feature launches to further improve signal

Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
21
May
2023

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual…

LINE Security Bug Bounty Program Report 2019
21
May
2023

Hackers Descend on London for First Ever UK Live Hacking Event: H1-4420

On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and…