Last year Detectify announced that we were AWS Technology Partners which meant that getting started with Detectify was made easier….
Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile…
Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be…
HackerOne’s Platform Catches Everything Organizations can ensure that security testing is a continuous process by combining regular pentests with bug…
Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC…
Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture…
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was…
Last year, Google expanded the ways you can submit removal requests for search results containing personal info. Before this change, people…
Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to…
Detectify year in review: 2019 has been quite a journey so far with expansion to the US and doubling our…
Keylogger is a malicious computer program that records everything you type on the keyboard, learns the keystroke pattern, including words,…
How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug bounty hunters who discover…