Category: Mix

The researcher’s desk: CVE-2025-59287 - Blog Detectify
17
Nov
2025

The researcher’s desk: FortiWeb Authentication Bypass (CVE-2025-64446)

Welcome to The researcher’s desk  – a content series where the Detectify security research team conducts a technical autopsy on…

Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters. | Blog
14
Nov
2025

Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters. | Blog

Amelia Coen | 14 November 2025 at 15:09 UTC AI isn’t just reshaping cybersecurity – it’s challenging testers to rethink…

The researcher’s desk: CVE-2025-59287 - Blog Detectify
14
Nov
2025

The researcher’s desk: CVE-2025-59287 – Blog Detectify

Welcome to The researcher’s desk  – a content series where the Detectify security research team conducts a technical autopsy on…

Product comparison: Detectify vs. Halo Security
14
Nov
2025

Product comparison: Detectify vs. Halo Security

Halo Security Pros It consolidates EASM, infrastructure scanning, and manual penetration testing services into a single platform, simplifying vendor management….

What You Need to Know — API Security
13
Nov
2025

What You Need to Know — API Security

Over the past few years, API security has gone from a relatively niche concern to a headline issue. A slew…

AI Has the Opposite Data Problem
12
Nov
2025

AI Has the Opposite Data Problem

We frequently hear that we have a data scarcity problem in AI. And when it comes to unique, Tolstoy-level literature…

Hunting for DOM-based XSS vulnerabilities: A complete guide
11
Nov
2025

Hunting for DOM-based XSS vulnerabilities: A complete guide

Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm….

Detectify AI-Researcher Alfred gets smarter with threat actor intelligence
10
Nov
2025

Detectify AI-Researcher Alfred gets smarter with threat actor intelligence

Six months after launch, Alfred, the AI Agent that autonomously builds security tests, has revolutionized our workflow. Alfred has delivered…

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide
07
Nov
2025

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide

Before JSON Web Tokens (JWTs) became popular in today’s app development landscape, web applications predominantly used server-side sessions, which presented…

Product comparison: Detectify vs. Rapid7
07
Nov
2025

Product comparison: Detectify vs. Rapid7

Rapid7 Pros Correlates web app vulnerabilities with underlying infrastructure risk and active threat data. Provides expansive enterprise discovery of unknown…

Anthropic Changes MCP Calls Into Filesystem-based Skills
05
Nov
2025

Anthropic Changes MCP Calls Into Filesystem-based Skills

Anthropic just came out with a new article about code execution with MCP which is pretty extraordinary. Loading external blog…

Product comparison: Detectify vs. Invicti
03
Nov
2025

Product comparison: Detectify vs. Invicti

Invicti Pros Deep, out-of-the-box integrations with CI/CD pipelines and issue trackers enable a fully automated, closed-loop “scan-to-ticket” workflow. It supports…