Category: Mix

Hunting for DOM-based XSS vulnerabilities: A complete guide
11
Nov
2025

Hunting for DOM-based XSS vulnerabilities: A complete guide

Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm….

Detectify AI-Researcher Alfred gets smarter with threat actor intelligence
10
Nov
2025

Detectify AI-Researcher Alfred gets smarter with threat actor intelligence

Six months after launch, Alfred, the AI Agent that autonomously builds security tests, has revolutionized our workflow. Alfred has delivered…

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide
07
Nov
2025

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide

Before JSON Web Tokens (JWTs) became popular in today’s app development landscape, web applications predominantly used server-side sessions, which presented…

Product comparison: Detectify vs. Rapid7
07
Nov
2025

Product comparison: Detectify vs. Rapid7

Rapid7 Pros Correlates web app vulnerabilities with underlying infrastructure risk and active threat data. Provides expansive enterprise discovery of unknown…

Anthropic Changes MCP Calls Into Filesystem-based Skills
05
Nov
2025

Anthropic Changes MCP Calls Into Filesystem-based Skills

Anthropic just came out with a new article about code execution with MCP which is pretty extraordinary. Loading external blog…

Product comparison: Detectify vs. Invicti
03
Nov
2025

Product comparison: Detectify vs. Invicti

Invicti Pros Deep, out-of-the-box integrations with CI/CD pipelines and issue trackers enable a fully automated, closed-loop “scan-to-ticket” workflow. It supports…

What’s Intigriti’s impact and position?
03
Nov
2025

What’s Intigriti’s impact and position?

You asked, and we answered.   At Intigriti, we’ve been paying close attention to the questions most frequently asked by those…

31
Oct
2025

Intigriti Bug Bytes #229 – October 2025

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Cool trick to find disclosed secrets…

The researcher’s desk: CVE-2025-20362 - Blog Detectify
31
Oct
2025

The researcher’s desk: CVE-2025-20362 – Blog Detectify

Welcome to The Researcher’s Desk – a content series where the Detectify security research team will conduct a technical autopsy…

Product comparison: Detectify vs. ProjectDiscovery
31
Oct
2025

Product comparison: Detectify vs. ProjectDiscovery

ProjectDiscovery Pros The entire assessment capability is built on the open-source Nuclei engine. An AppSec engineer can read, modify, and…

What the Q3 2025 ThreatStats Report Tells Us — API Security
31
Oct
2025

What the Q3 2025 ThreatStats Report Tells Us — API Security

Wallarm’s latest Q3 2025 API ThreatStats report [link placeholder] reveals that API vulnerabilities, exploits, and breaches are not just increasing;…

When to Use Claude Code Skills vs Commands vs Agents
31
Oct
2025

When to Use Claude Code Skills vs Commands vs Agents

Ever since Anthropic released Skills I’ve been thinking about how to optimize my Personal AI Infrastructure using the proper hierarchy….