Category: Mix

Join a demo session with Detectify
19
May
2023

Join a demo session with Detectify

We will have scheduled Demo sessions this week and we definitely think that you should join. In the 30 minute…

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500
19
May
2023

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500

September 4, 2018 – Eighteen month transitional period ends. Covered Entities are required to be in compliance with the requirements…

OWASP TOP 10: XXE - Detectify Blog
19
May
2023

OWASP TOP 10: Cross-site Scripting – XSS

Update: On the OWASP Top 10 2021 proposed, Cross-site scripting (XSS) was moved from the top of the OWASP list…

Explaining the Best Prompt Injection Proof of Concept · rez0
19
May
2023

Explaining the Best Prompt Injection Proof of Concept · rez0

I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
19
May
2023

Introducing the Hacker101 CTF | HackerOne

Hacker101 is getting something brand new: our own Capture The Flag! For those who are unfamiliar, Capture The Flags (better…

[Alert] New WordPress XSS Vulnerability Discovered
19
May
2023

[Alert] New WordPress XSS Vulnerability Discovered

Are you running WordPress 4.2.0 to 4.5.1? Time to upgrade to 4.5.2! It was recently discovered that WordPress versions 4.2.0 to…

How does Pentesting fit into your overall security strategy?
19
May
2023

The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today, Part 1

Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not alone. AWS has done a…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
19
May
2023

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted? – Detectify Blog

Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the…

Top Fierwall Misconfigurations & Their Exploits
19
May
2023

Top Fierwall Misconfigurations & Their Exploits

Network security should be a major focus for companies moving to the cloud. Cloud networks are exposed to the Internet…

[Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution
19
May
2023

[Alert] New Magento Vulnerability – Unauthenticated Remote Code Execution

Are you running Magento version before 2.0.6.? Time to upgrade!It was recently discovered that all Magento versions before 2.0.6. (both Community and Enterprise…

h1-415 CTF Winners Announced! | HackerOne
19
May
2023

Streamline Every Aspect of Your Responsible Disclosure Policy with HackerOne Response

“To improve the security of their connected systems, every corporation should have a vulnerability disclosure policy that allows them to…

Basefarm and Detectify enter partnership for better web security
19
May
2023

5 New Detectify Features – Detectify Blog

We have listened to your feedback and added several requested features to our service. Ability to remove tags that have…