Category: Mix
There are few, if any, organizations more risk-averse than the U.S. Department of Defense. But even this staid agency has…
Wouldn’t it be great if you could receive an email notification from Detectify every time a new finding is discovered?…
This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with…
We’ve spent quite some time figuring out how we could make it easier for you to work with your Detectify…
HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected by Cyber Catalyst insurers…
One of our latest Detectify Crowdsource hackers is Yasin Soliman, a bug bounty hunter from UK, who has been passionate…
For many organizations, the days when security acted as a final “check-in” are disappearing faster than the guacamole at a…
This week’s update brings more WordPress plugin vulnerabilities that Detectify now checks for as well as two Magento security tests. …
CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….
Due to its popularity as an e-commerce platform, Magento is an attractive target for hacker attacks, but basic security precautions…
Someone called it a “breach,” and the world took notice. Here is the story. There is no trust without transparency….
Magento is not only interesting for retailers – hackers like to target widely used platforms and the fact that online…











