EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
Detectify
Comparing ethical hacking to malicious hacking is kind of like comparing the good guys to the bad guys.
Ethical hackers look for vulnerabilities and report them, whereas malicious hackers have a more mischievous agenda. They are the guys you usually see in the movies hacking a bank and stealing money. Ethical hackers are the people working to make the world a safer place – like your favorite team of hackers at Detectify!
Comment from our expert:
“Ethical hackers are security consultants and good hearted people that find vulnerabilities on sites and services and report them to the company to prevent them from being hacked in the future. Many companies offer ”Bug Bounty Programs” where they ask Ethical Hackers to try and hack their sites in order to find loopholes, and in return they get a cash award for it.”
“The bigger the security breach they find, the more money the company is willing to pay. Hackers looking for those kinds of bugs and vulnerabilities on sites to get those kinds of awards are referred to as Bug Bounty Hunters,”
explains Johan Edholm at Detectify.
Want more IT security information? Don’t miss out on the other parts of our IT Sec FAQ series!
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
TLDR: This article details methods and tools (from DNS records and IP addresses to HTTP analysis and HTML content) that practitioners can use to classify …