Category: Mix

[Integration] You can now integrate Detectify with Trello
20
May
2023

[Integration] You can now integrate Detectify with Trello

For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to…

Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security
20
May
2023

Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security

The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters that are redefining practices and…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 3: What password-managers are good? Why should you use one?

People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
20
May
2023

Webinar: Learn How Hacker-Powered Pentests Give You More For Less

Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as a one-and-done annual exercise. You…

[Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution
20
May
2023

What is an SQL Injection and how do you fix it?

SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case…

Hackers take on San Francisco for the 4th Year in a Row
20
May
2023

The Journey to 100% Responsive Programs

Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to…

Lawfully Hacked | HackerOne
20
May
2023

Lawfully Hacked | HackerOne

The best way to prevent getting hacked is to try to get hacked. Paradoxical as this may sound, evidence shows…

WordPress Security - Detectify Blog
20
May
2023

How To Improve Your WordPress Security

WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and…

H1-702 CTF Winners Announced! | HackerOne
20
May
2023

H1-702 CTF Winners Announced! | HackerOne

Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first time ever, we had both…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White…

There is no room for racism or inequality here.
20
May
2023

The Hacker-Powered Security Report 2018

“Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers is expected to be rapid…”…