Newly added security tests, June 21, 2017: XSS and SQL injection modules
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
We are excited to announce new hacker profile pages on HackerOne! This redesign gives your profile a fresh new look and several new fields so…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a live event. Katie (@InsiderPhD)…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
HackerOne and the U.S. Department of Defense began working together in 2016 with the launch of Hack the Pentagon. Announced at the third annual Security@…
Detectify Crowdsource is a platform where hackers can submit vulnerabilities in web applications. Their findings are reviewed by our security team, and built into our…
Customers tell us that a big difference between hacker-powered security and traditional approaches is the impact. Since hackers make money for reporting vulnerabilities with a…
A technical write-up explaining AWS S3 misconfiguration is available on our Labs blog. AWS Simple Storage Service (often shortened to S3) is used by companies…
This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Over the past five years, Slack and HackerOne have established a partnership…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
Each blog in the series “Breaking Down the Benefits of Hacker-Powered Pentests” has focused on one of the key findings in Forrester Consulting’s report The…