Category: Mix

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to…

Lawfully Hacked | HackerOne
20
May
2023

Lawfully Hacked | HackerOne

The best way to prevent getting hacked is to try to get hacked. Paradoxical as this may sound, evidence shows…

WordPress Security - Detectify Blog
20
May
2023

How To Improve Your WordPress Security

WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and…

H1-702 CTF Winners Announced! | HackerOne
20
May
2023

H1-702 CTF Winners Announced! | HackerOne

Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first time ever, we had both…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
20
May
2023

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White…

There is no room for racism or inequality here.
20
May
2023

The Hacker-Powered Security Report 2018

“Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers is expected to be rapid…”…

WordPress Security - Detectify Blog
20
May
2023

How to Improve Your WordPress Security: Plugins and Themes

A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be…

GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne
20
May
2023

Zomato’s First Anniversary with Bug Bounties: Q&A with Security Lead, Prateek Tiwari

Headquartered in India – restaurant discovery, online ordering and table reservations platform Zomato currently operates in 24 countries; including the…

WordPress Security - Detectify Blog
20
May
2023

WordPress Security – Detectify Blog

WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most…

Improve Credential Sharing with Hacker Email Aliases
20
May
2023

Sumo Logic Penetration Testing Case Study

Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management and analytics company Sumo Logic…

OWASP TOP 10: XXE - Detectify Blog
20
May
2023

OWASP TOP 10: Injection – Detectify Blog

Update: Based on the OWASP Top 10 2021 proposed, injection now welcomes Cross-site Scripting (XSS) into the group. It’s no…

Juneteenth: HackerOne’s Day for Action
20
May
2023

Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament CEPS Task Force Report

In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union think tank, initiated a task force…