Category: Mix

Slack Increases Bounty Minimums For the Next 90 Days
19
May
2023

Say Yes To Cyber Help

In 2016, the DoD said Yes to cyber help by launching the Hack the Pentagon program. It took 13 minutes…

Detectify at PHP Meetup - Detectify Blog
19
May
2023

Detectify at PHP Meetup – Detectify Blog

On May 11th, we co-organised a PHP security meetup together with PHP Stockholm at SUP46, where our knowledge advisor Frans…

InnoGames Models Avatar After Top Ethical Hacker
18
May
2023

h1-5411 Recap – Argentina! Oath Bug Bounty

For the first time, HackerOne kicked off fall by migrating south. Way south. All the way to Buenos Aires, Argentina!…

TargetOverview
18
May
2023

[Release] New scan profile overview allows you to see progress over time

Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our…

Juneteenth: HackerOne’s Day for Action
18
May
2023

The Best is Yet To Come: DOD Awards New Hack the Pentagon Contract to HackerOne

Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
18
May
2023

IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify?

Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method,…

#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek
18
May
2023

Financial Services: Tips for Bug Bounty Success

In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
18
May
2023

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the…

How does Pentesting fit into your overall security strategy?
18
May
2023

What To Do When You’re Stuck Hacking

Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….

OWASP TOP 10: XXE - Detectify Blog
18
May
2023

OWASP TOP 10: Security Misconfiguration

Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…

Crowdsourcing Racial Justice and Equality
18
May
2023

Discovering programs is easier than ever with the new and improved Program Directory

Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the…

SPF Record Research - Detectify Blog
18
May
2023

Misconfigured email servers open the door to spoofed emails from top domains

TL;DR,  Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a…