Category: Mix
Detectify is on a mission to make the Internet safer through automation and crowdsourced hacker knowledge. We recently published “A…
What happens when everyone can become a video star just by having a script? Created/Updated: November 3, 2022 There are…
Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure policy and contact information in a…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
If we lose account validation from the checkmark, what are we getting in return? Created/Updated: November 3, 2022 When I…
Beiersdorf’s cybersecurity team is always thinking about the best ways to secure their public-facing assets. As their digital footprint increases,…
Spencer Pearlman, Security Researcher at Detectify, presented A Hacker’s Approach to Finding Security Bugs in Open Source Software in a…
We’re about to be able to collect—and ask questions of—any corpus of data Created/Updated: April 23, 2023 GPT-based AI is…
Accessing a major critical infrastructure network is very appealing to cybercriminals, as they can maximize societal impact and demand large…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Created/Updated: November 6, 2022 I’m a bit Elon and Twittered out, but I want to capture a basic prediction about…
Background The vulnerability allows unauthenticated remote code execution (RCE). Exploitation occurs by sending an HTTP request with an attack payload…











