Content-Security-Policy explained
30
Apr
2023

Content Security Policy (CSP) explained including common bypasses

We have written about Content Security Policy (CSP) on Detectify Labs before. But maybe you’re wondering why should you have…

Enhance Employee Productivity by Adopting a Modern Approach to Password Security
30
Apr
2023

Enhance Employee Productivity by Adopting a Modern Approach to Password Security

By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….

Complexity is Still the Enemy of Security
30
Apr
2023

Complexity is Still the Enemy of Security

Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…

HACK HARD. HAVE FUN. INCREASE SECURITY
30
Apr
2023

HACK HARD. HAVE FUN. INCREASE SECURITY

Amazon’s Live Hacking Event with HackerOne At Amazon, ensuring security is essential for earning customers’ trust. As part of Amazon’s ongoing…

What is a blind vulnerability and how can it be exploited and detected? 
30
Apr
2023

What is a blind vulnerability and how can it be exploited and detected? 

There are times where an attacker can hack a system and yet nothing is sent back, and this is classified…

30
Apr
2023

BUILD A RESILIENT SECURITY POSTURE WITH VULNERABILITY INTELLIGENCE AND CYBERSECURITY RATINGS

Reducing risk is the fundamental reason organizations invest in cybersecurity. The threat landscape grows and evolves, creating the need for…

Bypassing Cloudflare WAF with the origin server IP address
30
Apr
2023

Bypassing Cloudflare WAF with the origin server IP address

This is a guest blog post from Detectify Crowdsource hacker, Gwendal Le Coguic. This is a tutorial on how to…

Faulty Network Router Disposal Puts Firms At Risk: ESET
30
Apr
2023

Faulty Network Router Disposal Puts Firms At Risk: ESET

Secure data destruction and network router disposal go hand in hand when it comes to office network security. However, a…

30
Apr
2023

ANNOUNCING HACK THE ARMY 3.0 RESULTS: A CONVERSATION WITH DEFENSE DIGITAL SERVICE, U.S. ARMY, AND HACK THE ARMY 3.0’S TOP HACKER

Five years after the Defense Digital Service (DDS) launched the first-ever U.S. federal government bug bounty Challenge, we’re pleased to…

Meet the Team: Emelie Andersson - Building a fast-flying sales team
30
Apr
2023

Meet the Team: Emelie Andersson – Building a fast-flying sales team

Swedish west coast native Emelie Andersson moved to the other side of the country 6 years ago to pursue a…

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot
30
Apr
2023

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite…

Introducing Asset Inventory: stay on top of your web asset security
30
Apr
2023

Introducing Asset Inventory: stay on top of your web asset security

Good security starts with knowing your web assets. To enable transparency over your tech stack, we have released Asset Inventory,…