Search What is Detectify?
×

Web security blog

3 ways white-hat hackers can help you protect your website

Bug Bounty Crowdsourced security Detectify Crowdsource Ethical Hacking Responsible Disclosure Program Vulnerabilities White hat

CORS Misconfigurations Explained

CORS

Improved coverage and results with Out-of-band Exploitation Support

Detectify Detectify Crowdsource

Niklas Olsson, KTH Royal Institute of Technology: “Detectify lowers the threshold to work with security”

KTH Testimonials Workflow

Drupalgeddon 2.0 (CVE-2018-7600)

CMS Drupal Vulnerabilities

OWASP TOP 10: XXE

OWASP Top 10 XXE

OWASP TOP 10: Broken Access Control

broken access control OWASP Top 10 Vulnerabilities

OWASP TOP 10: Insufficient Logging and Monitoring

Insufficient Logging and Monitoring OWASP Top 10 Vulnerabilities

Risto Siilasmaa: “We have to assume that the bad guys will get in”

Detectify Risto Siilasmaa Security

Inside the mind of a black-hat hacker

black-hat hacking Responsible Disclosure Program Security Vulnerabilities