Category: Mix

How does Pentesting fit into your overall security strategy?
19
May
2023

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today, Part 1

Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not alone. AWS has done a…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted? – Detectify Blog

Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the…

Top Fierwall Misconfigurations & Their Exploits
19
May
2023

Top Fierwall Misconfigurations & Their Exploits

Network security should be a major focus for companies moving to the cloud. Cloud networks are exposed to the Internet…

[Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution
19
May
2023

[Alert] New Magento Vulnerability – Unauthenticated Remote Code Execution

Are you running Magento version before 2.0.6.? Time to upgrade!It was recently discovered that all Magento versions before 2.0.6. (both Community and Enterprise…

h1-415 CTF Winners Announced! | HackerOne
19
May
2023

Streamline Every Aspect of Your Responsible Disclosure Policy with HackerOne Response

“To improve the security of their connected systems, every corporation should have a vulnerability disclosure policy that allows them to…

Basefarm and Detectify enter partnership for better web security
19
May
2023

5 New Detectify Features – Detectify Blog

We have listened to your feedback and added several requested features to our service. Ability to remove tags that have…

How Hacktivity Can Save Your Company: Experts Weigh In
19
May
2023

How Hacktivity Can Save Your Company: Experts Weigh In

Hacktivity can save your company. Take help from hackers. You can’t do it alone. Approach hackers with an assumption of…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Insecure Direct Object Reference

Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. A proof of concept video follows…

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today Part 3: Logging, Monitoring, and Alerting in AWS
19
May
2023

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today Part 3: Logging, Monitoring, and Alerting in AWS

In the last two parts of this series, we discussed the AWS Shared Responsibility Model. We started with keeping your…

New crawler enables smarter scans and more relevant findings
19
May
2023

Meet Detectify this summer! – Detectify Blog

We’ve got some cool events coming up and we’re looking forward to discussing security at tech conferences, meetups and webinars. Check…

How does Pentesting fit into your overall security strategy?
19
May
2023

The U.S. Marine Corps Resolves Nearly 150 Vulnerabilities Thanks to Hackers

“I think we found something good,” said hackers @sumlac, @teknogeek, and @johnny said to a member of the MARFORCYBER team…

[Alert] Stored XSS in WordPress Plugin Jetpack
19
May
2023

[Alert] Stored XSS in WordPress Plugin Jetpack

Sucuri recently discovered a stored XSS in all versions from 2.0 (released in November 2012) of the popular WordPress plugin Jetpack. The plugin…