Inside the mind of a black-hat hacker
What does a black-hat hacker look like? The word probably conjures up a picture of a hoodie-wearing computer genius hacking...
Read more →What does a black-hat hacker look like? The word probably conjures up a picture of a hoodie-wearing computer genius hacking...
Read more →Black Lives Matter. During this time, I find myself with a mix of emotions that makes it difficult to focus....
Read more →Risto Siilasmaa is a pioneer in IT security and one of Detectify’s early investors. He is well-known for founding the...
Read more →Hello hackers! Thanks to all of you who participated in our #h1-2006 CTF! We had a lot of fun building it,...
Read more →Insufficient Logging and Monitoring is one of the categories on OWASP‘s Top 10 list and covers the lack of best...
Read more →Digital transformation has proven that every business is now a software business. In fact, using digital technology to create new...
Read more →Update: Broken Access Control is proposed to be number one on the new OWASP Top 10 list of 2021. The...
Read more →Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts...
Read more →Update: The new OWASP Top 10 of 2021 has been proposed, and the new list has moved XXE into the...
Read more →Starting this Friday, June 19th will become HackerOne’s annual Day for Action. For Black Americans and communities of color around...
Read more →On March 28th, Drupal released a security update that fixes a critical remote code execution vulnerability nicknamed Drupalgeddon 2.0. Detectify...
Read more →This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s...
Read more →