Search What is Detectify?
×

Web security blog

What is a blind vulnerability and how can it be exploited and detected? 

blind vulnerabilities injection out-of-band SQL

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

Anne-Marie Eklund Löwinder CISO featured IIS interview keys to the internet women in security

Content Security Policy (CSP) explained including common bypasses

CSP featured response headers

Lerhan: Bypassing IDOR protection with URL shorteners

Detectify Crowdsource featured IDOR Lerhan URL shorteners

HTTP response splitting exploitations and mitigations

featured http headers HTTP response splitting XSS

Fitting automated security throughout the CI/CD pipeline

automated security CI/CD DAST DevSecOps

The real impact of an Open Redirect vulnerability

featured open redirect SSRF web vulnerability

Meet the Hacker: Inti De Ceukelaire – “While everyone is looking for XSS I am just reading the docs.”

crowdsource Meet the hacker securinti

Detectify security updates for 02 May

security updates

Meet the team: Wilder Parks III – leading Detectify’s expansion shortstop style

Boston office expansion Meet the team Sales Wilder Parks