Category: Mix

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Cross-site Scripting – XSS

Update: On the OWASP Top 10 2021 proposed, Cross-site scripting (XSS) was moved from the top of the OWASP list…

Explaining the Best Prompt Injection Proof of Concept · rez0
19
May
2023

Explaining the Best Prompt Injection Proof of Concept · rez0

I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Introducing the Hacker101 CTF | HackerOne

Hacker101 is getting something brand new: our own Capture The Flag! For those who are unfamiliar, Capture The Flags (better…

[Alert] New WordPress XSS Vulnerability Discovered
19
May
2023

[Alert] New WordPress XSS Vulnerability Discovered

Are you running WordPress 4.2.0 to 4.5.1? Time to upgrade to 4.5.2! It was recently discovered that WordPress versions 4.2.0 to…

How does Pentesting fit into your overall security strategy?
19
May
2023

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today, Part 1

Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not alone. AWS has done a…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted? – Detectify Blog

Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the…

Top Fierwall Misconfigurations & Their Exploits
19
May
2023

Top Fierwall Misconfigurations & Their Exploits

Network security should be a major focus for companies moving to the cloud. Cloud networks are exposed to the Internet…

[Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution
19
May
2023

[Alert] New Magento Vulnerability – Unauthenticated Remote Code Execution

Are you running Magento version before 2.0.6.? Time to upgrade!It was recently discovered that all Magento versions before 2.0.6. (both Community and Enterprise…

h1-415 CTF Winners Announced! | HackerOne
19
May
2023

Streamline Every Aspect of Your Responsible Disclosure Policy with HackerOne Response

“To improve the security of their connected systems, every corporation should have a vulnerability disclosure policy that allows them to…

Basefarm and Detectify enter partnership for better web security
19
May
2023

5 New Detectify Features – Detectify Blog

We have listened to your feedback and added several requested features to our service. Ability to remove tags that have…

How Hacktivity Can Save Your Company: Experts Weigh In
19
May
2023

How Hacktivity Can Save Your Company: Experts Weigh In

Hacktivity can save your company. Take help from hackers. You can’t do it alone. Approach hackers with an assumption of…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Insecure Direct Object Reference

Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. A proof of concept video follows…