Category: Mix
Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….
Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…
Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the…
TL;DR, Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a…
George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing…
There is a lot think about when it comes to security, but what is the one most important piece of advice…
Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard,…
Our next update is here! Two weeks ago we released the new scan profile overview to make it easier for…
Receiving vulnerabilities has never been easier with the release of our newest integration: Embedded Submissions. What started with Email forwarding…
Update: The new OWASP Top 10 for 2021 proposed has grouped Sensitive Data Exposure with failures related to cryptography into…
Forty top hackers met in Montréal in mid-October to hack Canada-based Shopify. The commerce platform helps more than a half-million…
Security is not only a competitive edge, it’s a must. Companies will soon be compelled to implement a holistic security…







![[Release] New dashboard, navigation and better support for unlimited scan profiles Detectify Navigation](https://image.cybernoz.com/wp-content/uploads/2023/05/Release-New-dashboard-navigation-and-better-support-for-unlimited-scan-360x270.png)

