Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be…
HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug…
Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC…
Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture…
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was…
Last year, Google expanded the ways you can submit removal requests for search results containing personal info. Before this change, people…
Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to…
Detectify year in review: 2019 has been quite a journey so far with expansion to the US and doubling our…
Keylogger is a malicious computer program that records everything you type on the keyboard, learns the keystroke pattern, including words,…
How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…
Detectify Crowdsource hacker Akhil George, aka streaak, is a full-time student who chases bug bounties during his free time. His…
HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into…