Category: Mix
We’re going to highlight the Top high severity CVEs found by Detectify. Thanks to the Crowdsource global community of handpicked…
If you’re reading this you already know the internet is on fire over the new GPTChatBot from OpenAI. There are…
How to batch rename images with custom values using file, awk, and rename – in rainbow colors! The most recent…
We previously looked at common server authentication issues we see in code review and offered tips to avoid them. If you followed…
We’ve put together a list of the most visited Detectify blog posts on common web vulnerabilities to help anyone interested…
This is a member-only post. Thank you for being part of this. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image:…
Some thoughts and concrete suggestions on saving society through programming. This morning I read an article that’s been making the…
Question: “I spend the majority of my time researching and keeping up with current affairs. I don’t feel like anything…
Detectify announces presence at Black Hat USA. In-person and virtual participation in leading cybersecurity conference will empower companies to keep…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 5, 2022…
A guide to using Amazon Web Services to serve your site with HTTPS. For (almost) free. 2017-12-13 20:46:12 -0500 -0500…
5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains all of these and…











