Search What is Detectify?

Web security blog

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN

Alyssa Herrera Detectify Crowdsource File Disclosure pulse secure SSL VPN

How we tracked down (what seemed like) a memory leak in one of our Go microservices

Backend Developer best practices go memory leak microservices

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet

Detectify Crowdsource featured fortinet pulse secure SSL VPN

Introducing Asset Inventory: stay on top of your web asset security

asset inventory asset monitoring featured product update

Meet the Team: Emelie Andersson – Building a fast-flying sales team

Meet the team Sales

Bypassing Cloudflare WAF with the origin server IP address

cloudflare Detectify Crowdsource Gwendal Le Coguic WAF

Improving WordPress plugin security from both attack and defense sides

Detectify Crowdsource Paul Dannewitz Plugins WordPress

What is a blind vulnerability and how can it be exploited and detected? 

blind vulnerabilities injection out-of-band SQL

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet women in security

Content Security Policy (CSP) explained including common bypasses

CSP response headers