What is a blind vulnerability and how can it be exploited and detected? 
30
Apr
2023

What is a blind vulnerability and how can it be exploited and detected? 

There are times where an attacker can hack a system and yet nothing is sent back, and this is classified…

30
Apr
2023

BUILD A RESILIENT SECURITY POSTURE WITH VULNERABILITY INTELLIGENCE AND CYBERSECURITY RATINGS

Reducing risk is the fundamental reason organizations invest in cybersecurity. The threat landscape grows and evolves, creating the need for…

Bypassing Cloudflare WAF with the origin server IP address
30
Apr
2023

Bypassing Cloudflare WAF with the origin server IP address

This is a guest blog post from Detectify Crowdsource hacker, Gwendal Le Coguic. This is a tutorial on how to…

Faulty Network Router Disposal Puts Firms At Risk: ESET
30
Apr
2023

Faulty Network Router Disposal Puts Firms At Risk: ESET

Secure data destruction and network router disposal go hand in hand when it comes to office network security. However, a…

30
Apr
2023

ANNOUNCING HACK THE ARMY 3.0 RESULTS: A CONVERSATION WITH DEFENSE DIGITAL SERVICE, U.S. ARMY, AND HACK THE ARMY 3.0’S TOP HACKER

Five years after the Defense Digital Service (DDS) launched the first-ever U.S. federal government bug bounty Challenge, we’re pleased to…

Meet the Team: Emelie Andersson - Building a fast-flying sales team
30
Apr
2023

Meet the Team: Emelie Andersson – Building a fast-flying sales team

Swedish west coast native Emelie Andersson moved to the other side of the country 6 years ago to pursue a…

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot
30
Apr
2023

60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite…

Introducing Asset Inventory: stay on top of your web asset security
30
Apr
2023

Introducing Asset Inventory: stay on top of your web asset security

Good security starts with knowing your web assets. To enable transparency over your tech stack, we have released Asset Inventory,…

Apple, Google, and Microsoft Just Fixed Zero-Day Security Flaws
30
Apr
2023

Apple, Google, and Microsoft Just Fixed Zero-Day Security Flaws

Tech giants Apple, Microsoft, and Google each fixed major security flaws in April, many of which were already being used…

AresLoader Camouflaged as a Citrix Project Sold for a $300 Subscription on GitHub
30
Apr
2023

AresLoader Camouflaged As A Citrix Project Sold For A $300 Subscription On GitHub

A new loader that is used to run and install additional malware on targeted systems was found by researchers at…

30
Apr
2023

How Hackers Can Help Reduce Your Organization’s Application Risk on AWS

HackerOne recently hosted AWS and a panel of expert ethical hackers to discuss how Server-Side Request Forgery (SSRF) vulnerabilities and cloud misconfiguration are ripe…

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet
30
Apr
2023

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet

Pulse Secure and Fortinet have announced advisories detailing a critical vulnerability found that enables an unauthenticated user to conduct file…