Category: Mix
As we are all currently confined to a life at home during the pandemic, it has become more important than…
What Is Vulnerability Remediation? Vulnerability remediation is the process of addressing system security weaknesses. The steps include the following:…
Scope-creeping doesn’t always end up in a 0-day with a CVE assigned, and this was the fortune of Detectify Crowdsource…
Fortunately, for security leaders and their colleagues in IT charged with executing digital transformations, their relationships with executive management are…
In a fast-paced tech environment, the potential attack surface increases with each release. Tech companies can no longer only safeguard…
What Are the Benefits of Bug Bounties? A bug bounty program is a cost-effective way for an organization to pinpoint…
Portable Document Format (PDF), is this secure or is it something to be suspicious about upon receiving? Jens Müller gave…
Trustpilot, a cloud-first company with little physical infrastructure, relies on external security testing to ensure its products are resilient to…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push…
What Is a Vulnerability Disclosure Program? A VDP is a structured method for anyone to report vulnerabilities. VDPs should include…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push out major Detectify security updates…
At HackerOne’s recent 2021 Security@ conference, we spoke to Mike Hanley, CSO at GitHub. As a company that prizes security…











