Category: Mix

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows
29
Apr
2023

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

 Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to…

Detectify year in review 2019
29
Apr
2023

Detectify year in review 2019

Detectify year in review: 2019 has been quite a journey so far with expansion to the US and doubling our…

What Are Bug Bounties? How Do They Work? [With Examples]
29
Apr
2023

What Are Bug Bounties? How Do They Work? [With Examples]

How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…

Guest blog: streaak - my recon techniques from 2019
29
Apr
2023

Guest blog: streaak – my recon techniques from 2019

Detectify Crowdsource hacker Akhil George, aka streaak, is a full-time student who chases bug bounties during his free time. His…

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action
29
Apr
2023

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into…

Detectify
29
Apr
2023

Web security trends to watch for 2020

What are web security trends for 2020? This year we anticipate the build-up of a new security market category, growing…

What We Can Learn From Recent Ransomware Attacks 
29
Apr
2023

What We Can Learn From Recent Ransomware Attacks 

Earlier this month, software vendor Kaseya made headlines when a vulnerability in its Virtual System Administrator (VSA) software led to…

M. Loewinger, Smartbear: “Each product has a DevOps lead who manages Detectify and all its findings”
29
Apr
2023

M. Loewinger, Smartbear: “Each product has a DevOps lead who manages Detectify and all its findings”

Detectify user story: Smartbear offers automated software testing solutions that help development and testing teams ensure quality throughout the software…

miessler-post-llm-software-ai
29
Apr
2023

Pre and Post-LLM Software – Daniel Miessler

If you’re not transitioning your software and business to the post-LLM model, you’ll be replaced by someone who has Created/Updated:…

Vulnerability Assessment I A Complete Guide
29
Apr
2023

Vulnerability Assessment I A Complete Guide

Are you wondering about vulnerability assessments? We give a full explanation of what vulnerability assessments are, how they work, and…

Web security trends 2020 from 3 security leaders
29
Apr
2023

Web security trends 2020 from 3 security leaders

In part 1 of web security trends 2020, we discussed the rise of Crowdsourced Security and the ever-changing attack surface….

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham
29
Apr
2023

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham

The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling his security team with the…