Category: Mix

Top 3 takeaways from CIO Trend 2016
21
May
2023

Top 3 takeaways from CIO Trend 2016

In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this…

Slack Increases Bounty Minimums For the Next 90 Days
21
May
2023

Live-hacking Dropbox in Amsterdam for H1-3120

Nearly 40 hackers representing 12 countries were in Amsterdam on May 26, 2018 with one focus: hacking Dropbox!  Dropbox runs…

Inside the head of a white hat hacker
21
May
2023

Inside the head of a white hat hacker

Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s…

Q&A with Brian Neely, CIO & CISO of AMERICAN SYSTEMS
21
May
2023

Advanced triggers feature launches to further improve signal

Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
21
May
2023

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual…

LINE Security Bug Bounty Program Report 2019
21
May
2023

Hackers Descend on London for First Ever UK Live Hacking Event: H1-4420

On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and…

[Integration] You can now integrate Detectify with Trello
20
May
2023

[Integration] You can now integrate Detectify with Trello

For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to…

Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security
20
May
2023

Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security

The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters that are redefining practices and…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 3: What password-managers are good? Why should you use one?

People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
20
May
2023

Webinar: Learn How Hacker-Powered Pentests Give You More For Less

Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as a one-and-done annual exercise. You…

[Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution
20
May
2023

What is an SQL Injection and how do you fix it?

SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case…

Hackers take on San Francisco for the 4th Year in a Row
20
May
2023

The Journey to 100% Responsive Programs

Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity. That’s why over the past…