The Most Overlooked Server Permission Checks
We previously looked at common server authentication issues we see in code review and offered tips to avoid them. If you followed...
Read more →We previously looked at common server authentication issues we see in code review and offered tips to avoid them. If you followed...
Read more →We’ve put together a list of the most visited Detectify blog posts on common web vulnerabilities to help anyone interested...
Read more →This is a member-only post. Thank you for being part of this. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image:...
Read more →Some thoughts and concrete suggestions on saving society through programming. This morning I read an article that’s been making the...
Read more →Question: “I spend the majority of my time researching and keeping up with current affairs. I don’t feel like anything...
Read more →Detectify announces presence at Black Hat USA. In-person and virtual participation in leading cybersecurity conference will empower companies to keep...
Read more →Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 5, 2022...
Read more →A guide to using Amazon Web Services to serve your site with HTTPS. For (almost) free. 2017-12-13 20:46:12 -0500 -0500...
Read more →5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains all of these and...
Read more →Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. Due to confidentially agreements, we cannot publicize all...
Read more →Click for printable size. Here’s a quick list of things we can do to get ready for AI’s ascendance. You...
Read more →How a fun but useless project turned into a Unicode substitution cipher algorithm. Full transparency: I occasionally waste time messing...
Read more →