Web security trends 2020 from 3 security leaders
In part 1 of web security trends 2020, we discussed the rise of Crowdsourced Security and the ever-changing attack surface. This time we turned to…
In part 1 of web security trends 2020, we discussed the rise of Crowdsourced Security and the ever-changing attack surface. This time we turned to…
The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling his security team with the most advanced security testing methods…
In 2020, both big and small companies alike are embracing pen-testing as a solution to ensure the quality and availability of their mission-critical communication systems…
Q: Tell us who you are. I’m Robert Lowery, Senior Analyst at Hyatt. I’m part of the Vulnerability Management team, which oversees the bug bounty…
Some know him by his hacker handle, TomNomNom. UK-native Tom Hudson started at Detectify as a Senior Security Researcher, and he is now the Tech…
Who is DC3’s DCISE? Krystal Covey: The Defense Collaborative Information Sharing Environment (DCISE) is the operational hub for the DOD’s DIB Cybersecurity (CS) Program offering…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from…
How Can You Use the Integration? This new integration reduces the manual processes of comparing and taking action on vulnerability findings between the two platforms…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security…
What is your role as an ambassador? 🌎 As an ambassador, I aim to foster a bug bounty community in France and other French-speaking countries.…
HTTP request smuggling is increasingly exploited by hackers in the wild and in bug bounty programs. This post will explain the HTTP request smuggling attack…
Today HackerOne announced new capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests specific to AWS environments, an…