
Commonly Misunderstood Bugs: Authorization Based Vulnerabilities

Source link
Related Articles
All Mix →Personal Daemons and Wuffie
Table of Contents The Personal Daemon Use Cases Wuffie Total Karma Ratings for Popular Locations Everyone knows the future of technology lies with the individual.…
Release: You are now able to add your own subdomains
In the latest release, we launched the possibility to add your own subdomains without verifying them separately. Since before we have been able to look…
New crawler enables smarter scans and more relevant findings
The crawler is the heart of the Detectify service. During the crawling phase, Detectify is trying to collect all possible pages of your website. That…
Maintaining the Intelligence Edge in Cybersecurity
This $300 million not only reflects a decade of making the internet safer but also serves as a beacon to the brightest security minds worldwide.…
Capture the Flag (CTF) – Reversing the Password
Last week, I made a mini Capture The Flag (CTF) about a criminal who changed Barry’s password. The challenge was to come up with the…
LINE Security Bug Bounty Program Report 2019
This guest blog post was authored by Robin Lunde from the LINE Security team and originally published on the LINE company blog. Hello! I am…