Category: Mix

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 7: What is OWASP Top 10?

The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software….

Confessions of European CISOs | HackerOne
19
May
2023

What is a Responsible Disclosure Policy and Why You Need One

Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations of all shapes and sizes…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Broken Authentication

Update: Broken Authentication has moved down the list to position #7 because it seems to be less of an issue…

h1-415 CTF Winners Announced! | HackerOne
19
May
2023

H1-702 2018 makes history with over $500K in bounties paid!

In August 2016, a small group of HackerOne staff brought to life the first ever live hacking event in HackerOne’s…

Join a demo session with Detectify
19
May
2023

Join a demo session with Detectify

We will have scheduled Demo sessions this week and we definitely think that you should join. In the 30 minute…

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500
19
May
2023

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500

September 4, 2018 – Eighteen month transitional period ends. Covered Entities are required to be in compliance with the requirements…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Cross-site Scripting – XSS

Update: On the OWASP Top 10 2021 proposed, Cross-site scripting (XSS) was moved from the top of the OWASP list…

Explaining the Best Prompt Injection Proof of Concept · rez0
19
May
2023

Explaining the Best Prompt Injection Proof of Concept · rez0

I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Introducing the Hacker101 CTF | HackerOne

Hacker101 is getting something brand new: our own Capture The Flag! For those who are unfamiliar, Capture The Flags (better…

[Alert] New WordPress XSS Vulnerability Discovered
19
May
2023

[Alert] New WordPress XSS Vulnerability Discovered

Are you running WordPress 4.2.0 to 4.5.1? Time to upgrade to 4.5.2! It was recently discovered that WordPress versions 4.2.0 to…

How does Pentesting fit into your overall security strategy?
19
May
2023

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today, Part 1

Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not alone. AWS has done a…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted? – Detectify Blog

Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the…