
How Internal Scanning works: Q&A with Detectify’s product expert
Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Detectify

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users.
The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers. We added these tests to the Detectify scanner from December 14 – December 26.
This module looks for a DOM-based XSS vulnerability affecting the Javascript library Backbone Query Parameters. This library is present in several web applications, such as Atlassian Jira Service Desk.
This modules tries to reveal the source code of files handled by Citrix XenMobile Server. The vulnerability was fixed in the latest release patches for XenMobile Server 10.12 and 10.13.
This modules detects if SolarWinds Orion is running a version that may have been altered by a backdoor.
The “Microsoft IIS Administration” service uses a settings file that may contain tokens, passwords, and PII.

Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, …