Pulse Secure and Fortinet have announced advisories detailing a critical vulnerability found that enables an unauthenticated user to conduct file…
With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology and in its approach to…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSA Conference 2023RSA Conference 2023…
Detectify Crowdsource hacker, Alyssa Herrera, is a full-time bug bounty hacker and web application security researcher who works to protect…
Developers need to bring security into their workflows without pivoting to separate security tools to get vulnerability information. HackerOne has created an…
Finding a zero-day (0-day) is probably one of the best feelings in the world for a hacker, and sometimes we…
Recently, the cybersecurity researchers at Cyble discovered a new macOS malware, ‘Atomic’ (aka ‘AMOS’), sold for $1,000/month on private Telegram…
Wondering what vulnerability scanning is? We will explain how it works, why you need to do it, and how to…
Karim Rahal, Detectify Crowdsource hacker, is a 17-year-old web-hacker who has been hacking for the greater part of his teenager…
I’m not going to define DevSecOps in yet another blog post. There are plenty of great resources for that. I…
Detectify now has a built-in detection for vBulletin RCE CVE-2019-16759, thanks to a report from our Crowdsource community. Last week,…
What is the Difference Between Bug Bounties and Penetration Testing? Organizations offer ongoing bug bounties to freelance ethical hackers to discover…