Newly added security tests March 23, 2017: CVE-2017-5638 and Joomla SQL injections
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions, innovative presentations, and record-breaking live…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat down with Laurie Mercer, a…
Johan Edholm is one of the founders of Detectify and a well-established profile in the Swedish IT security community. With his strong presence on online…
Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to find vulnerabilities before criminals…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
A hacker is “one who enjoys the intellectual challenge of creatively overcoming limitations.” No one exemplifies that definition like Steve Gibson, Founder of Gibson Research…
1) More transparency on what tests we have performed Transparency is one of our core values at Detectify, and we want to get as far…
Assign severity to policy breaches AppSec teams often struggle to either validate or scale their security policies, like enforcing security headers or removing risky technologies.…
It’s been two years since Upserve launched its public bug bounty program on HackerOne. During that time, Upserve’s security team has resolved over 85 valid…
The Internet of Things is new, exciting, and unregulated. What could possibly go wrong? Security analyst Emma Lilliestam highlights the shortcomings of IoT security and…