Category: Mix
Detectify security experts are speaking with security managers and operational defenders daily. There’s a clear division on how a modern…
Let me start with the punchline: Something like 80% of most “knowledge work” is about to get replaced by artificial…
The basics of writing iterations in Python using for loops, list comprehensions, and map. 2017-01-18 21:58:28 +0700 +0700 January 18,…
Understanding Injection Vulnerabilities Injection vulnerabilities exist when information provided by users of the application is not properly validated or sanitized…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 356 |…
A guide (for the minimally tech-savvy) to setting up a website with HTTPS using Hugo, Cloudflare and GitHub Pages. I…
NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real security issues I’ve found while…
The crowd has spoken… Earlier this year, G2 reviews platform awarded Detectify with a Best Support badge for our category…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | November 14, 2022…
How you can use tools your Linux system already has to create custom desktop notifications. In my last post I…
From Jessica Sexton – Director of Community, Three years ago, I found my home at HackerOne. My primary focus was…











