Category: Mix
Security is not compliance. This is something that the security champions at Detectify can agree on and each employee practices…
For TikTok, a platform that sees more than one billion monthly active users, staying ahead of cyber threats is always…
Greetings, digital guardians. Today, we’ll be diving into the wonderful world of External Attack Surface Management (EASM) platforms. As the…
Created/Updated: August 7, 2022 A number of security people have come out against Amazon buying One Medical. It’s to be…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
At HackerOne’s recent Security@ global cybersecurity conference, three HackerOne experts—CTO and Co-founder Alex Rice, Senior Security Technologist Kayla Underkoffler, and…
In the summertime, I shared my thoughts on how Detectify Crowdsource is not your average bug bounty program. Through this,…
A few years ago I figured out why we’re so creative in the shower Created/Updated: October 26, 2022 Our creativity…
What is vulnerability management? Vulnerability management is the process of continuously identifying, categorizing, and remediating technology system security vulnerabilities. Vulnerability…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Created/Updated: August 21, 2022 The internet’s gone a bit crazy about Sam Harris supposedly supporting censorship. As in most cases,…
Among the topics they explored included the success of their long-running bug bounty programs in discovering security vulnerabilities, how to…











