Category: Mix

Do you trust your cache? – Web Cache Poisoning explained
28
Apr
2023

Do you trust your cache? – Web Cache Poisoning explained

As we are all currently confined to a life at home during the pandemic, it has become more important than…

Vulnerability Remediation | A Step-by-Step Guide
27
Apr
2023

Vulnerability Remediation | A Step-by-Step Guide

  What Is Vulnerability Remediation? Vulnerability remediation is the process of addressing system security weaknesses. The steps include the following:…

Crowdsource Success Story: From an Out-of-Scope Open Redirect to CVE-2020-1323
27
Apr
2023

Crowdsource Success Story: From an Out-of-Scope Open Redirect to CVE-2020-1323

Scope-creeping doesn’t always end up in a 0-day with a CVE assigned, and this was the fortune of Detectify Crowdsource…

Navigating a Safe, Successful Return to Office: 5 Tips for Security Leaders
27
Apr
2023

Navigating a Safe, Successful Return to Office: 5 Tips for Security Leaders

Fortunately, for security leaders and their colleagues in IT charged with executing digital transformations, their relationships with executive management are…

How to reduce your attack surface
27
Apr
2023

How to reduce your attack surface

In a fast-paced tech environment, the potential attack surface increases with each release. Tech companies can no longer only safeguard…

Bug Bounty Benefits | Why You Need a Bug Bounty Program
27
Apr
2023

Bug Bounty Benefits | Why You Need a Bug Bounty Program

What Are the Benefits of Bug Bounties? A bug bounty program is a cost-effective way for an organization to pinpoint…

How secure is the PDF file?
27
Apr
2023

How secure is the PDF file?

Portable Document Format (PDF), is this secure or is it something to be suspicious about upon receiving? Jens Müller gave…

How Trustpilot Manages Risk by Working with Ethical Hackers
27
Apr
2023

How Trustpilot Manages Risk by Working with Ethical Hackers

Trustpilot, a cloud-first company with little physical infrastructure, relies on external security testing to ensure its products are resilient to…

Detectify security updates for 4 September
27
Apr
2023

Detectify security updates for 4 September

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push…

What’s a Vulnerability Disclosure Program & Do You Need One?
27
Apr
2023

What’s a Vulnerability Disclosure Program & Do You Need One?

What Is a Vulnerability Disclosure Program? A VDP is a structured method for anyone to report vulnerabilities. VDPs should include…

Detectify Security Updates for September 17
27
Apr
2023

Detectify Security Updates for September 17

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push out major Detectify security updates…

DevSecOps: Bridging the Gap Between Security and Development
27
Apr
2023

DevSecOps: Bridging the Gap Between Security and Development

At HackerOne’s recent 2021 Security@ conference, we spoke to Mike Hanley, CSO at GitHub. As a company that prizes security…