Category: Mix
There are all kinds of apps on Facebook – quizzes, games and corporate sweepstakes. But it might be a good…
When looking for a model to inform your own security posture, the Department of Defense would be a good place…
You might have noticed that Google occasionally flags some websites with a “This site may be hacked”-flag or a “This…
GDPR is finally upon us. The onslaught of “we’ve updated our privacy policy” emails to your inbox should have been…
Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep…
The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August…
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this…
Nearly 40 hackers representing 12 countries were in Amsterdam on May 26, 2018 with one focus: hacking Dropbox! Dropbox runs…
Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s…
Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs…
To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual…
On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and…




![Joomla security – Detectify Blog [Alert] Critical authentication bypass + privilege escalation exploit in Joomla](https://image.cybernoz.com/wp-content/uploads/2023/05/Alert-Critical-authentication-bypass-privilege-escalation-exploit-in-Joomla-331x270.png)





