Category: Mix

OWASP TOP 10: XXE - Detectify Blog
18
May
2023

OWASP TOP 10 2013: Cross-site Request Forgery – CSRF

Cross-site Request Forgery (CSRF) is one of the vulnerabilities on OWASP’s Top 10 list. Its an attack used to make requests…

h1-415 CTF Winners Announced! | HackerOne
18
May
2023

Test your hacking skills on real-world simulated bugs

Hacktivity is a treasure trove of vulnerability data and tactics. You’ve got newly published reports from across the web, staple…

General Data Protection Regulation: What It Means For Your Business
18
May
2023

General Data Protection Regulation: What It Means For Your Business

Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update…

Hacking for Good | HackerOne
17
May
2023

Easy and secure Credential Management

Earlier this year we introduced Hacker Email Aliases which enables you to secure set up accounts for hackers inside your…

[Integration] Integrate Detectify with Jira, Github, Instagram and much more using Zapier
17
May
2023

[Integration] Integrate Detectify with Jira, Github, Instagram and much more using Zapier

Automation should be for everyone, which is why we at Detectify love Zapier. We wanted to make it possible for…

Hackers take on San Francisco for the 4th Year in a Row
17
May
2023

Q&A with Flickr’s Senior Engineering Manager Alex Seville

It’s the largest online photo management and sharing application in the world, so chances are you may have heard of…

OWASP TOP 10: XXE - Detectify Blog
17
May
2023

OWASP TOP 10: Using Components with Known Vulnerabilities

Using components with known vulnerabilities is one of the vulnerability categories on OWASP‘s list of the ten most common vulnerabilities. A proof…

Slack Increases Bounty Minimums For the Next 90 Days
17
May
2023

Hacktivity Disclosure for Private Programs

Disclosure is in the DNA of HackerOne. We call it Hacktivity and have supported public disclosure workflows of vulnerability reports…

Beta feature: New and more consistent crawler
17
May
2023

[Release] New modules – Detectify Blog

Security never stands still, which is why we update our service on a regular basis to help you keep up…

What to Look For in a Penetration Testing Company
17
May
2023

Grammarly’s Bug Bounty Program Goes Public: Q&A with VP of Engineering Joe Xavier

It’s been over a year since Grammarly launched its first bug bounty program on HackerOne. It’s been a private, invite-only…

OWASP TOP 10: XXE - Detectify Blog
17
May
2023

OWASP TOP 10 2013: Unvalidated Redirects and Forwards

Unvalidated redirects and forwards, also referred to as Open Redirect, is featured on OWASP‘s list of the ten most common vulnerabilities….

GitLab’s Public Bug Bounty Program Kicks Off: Q&A with GitLab’s Kathy Wang & James Ritchey
17
May
2023

GitLab’s Public Bug Bounty Program Kicks Off: Q&A with GitLab’s Kathy Wang & James Ritchey

GitLab is a single application for the entire DevOps lifecycle, making software development easier and more efficient, without sacrificing security…