Category: Mix

WordPress Security - Detectify Blog
20
May
2023

How to Improve Your WordPress Security: Plugins and Themes

A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be…

GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne
20
May
2023

Zomato’s First Anniversary with Bug Bounties: Q&A with Security Lead, Prateek Tiwari

Headquartered in India – restaurant discovery, online ordering and table reservations platform Zomato currently operates in 24 countries; including the…

WordPress Security - Detectify Blog
20
May
2023

WordPress Security – Detectify Blog

WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most…

Improve Credential Sharing with Hacker Email Aliases
20
May
2023

Sumo Logic Penetration Testing Case Study

Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management and analytics company Sumo Logic…

OWASP TOP 10: XXE - Detectify Blog
20
May
2023

OWASP TOP 10: Injection – Detectify Blog

Update: Based on the OWASP Top 10 2021 proposed, injection now welcomes Cross-site Scripting (XSS) into the group. It’s no…

Juneteenth: HackerOne’s Day for Action
20
May
2023

Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament CEPS Task Force Report

In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union think tank, initiated a task force…

pwyw-banner
20
May
2023

Convince Your Client To Use Detectify

  Want to offer your clients security and help them make their services safer with Detectify? That’s fantastic! Security is…

Improve Credential Sharing with Hacker Email Aliases
20
May
2023

Improve Credential Sharing with Hacker Email Aliases

Starting today, all existing and new hackers get a personalized email alias tied to their account, in the form of…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 6: What CMS is the most vulnerable?

A CMS is a Content Management System used to create, manage and organize content on a web sites or web…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
20
May
2023

Oath Bug Bounty Program Update: $1M in payouts and expansion of the program

This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally published on Oath.com. A little more…

OWASP Top 10 Vulnerabilities Explained
20
May
2023

OWASP Top 10 Vulnerabilities Explained

OWASP is a non-profit organization with the goal of improving the security of software and internet. They have put together…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Hacker-Powered Security Report 2018, 188 Facts

Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since…