Joomla security – Detectify Blog
Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep up to date on Joomla…
Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep up to date on Joomla…
The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August 12! HackerOne 1337 will be…
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this change is the CIO. The…
Since Arvind Krishna became the CEO in April 2020, IBM has acquired more than 30 companies. They made their 5th acquisition with Polar Security after…
At the age of 5, an American boy Kristoffer von Hassel became the youngest hacker after he found a vulnerability in the Microsoft Live Xbox…
The SiegedSec hacker group named several Colombian organizations to its victim list. According to the website of the hackers, nearly 30 radio broadcasts and 8…
Nearly 40 hackers representing 12 countries were in Amsterdam on May 26, 2018 with one focus: hacking Dropbox! Dropbox runs a top public bug bounty…
Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s event Säkerhetsdagen 2016 in Stockholm.…
Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports create a burden for programs and reduce the time that…
PyPI, the official third-party registry of open source Python packages has temporarily suspended new users from signing up, and new projects from being uploaded to…
To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual for people to install and…
On Saturday, June 16, almost 50 hackers gathered from across the world to hack one of the most popular and mature bug bounty programs on…