Search What is Detectify?
×

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN

Alyssa Herrera Detectify Crowdsource File Disclosure pulse secure SSL VPN
Backend Developer best practices go memory leak microservices

How we tracked down (what seemed like) a memory leak in one of our Go microservices

Detectify Crowdsource fortinet pulse secure SSL VPN

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet

asset inventory asset monitoring product update

Introducing Asset Inventory: stay on top of your web asset security

Meet the team Sales woman in security

Meet the Team: Emelie Andersson – Building a fast-flying sales team

cloudflare Detectify Crowdsource Gwendal Le Coguic WAF

Bypassing Cloudflare WAF with the origin server IP address

Detectify Crowdsource Paul Dannewitz Plugins WordPress

Improving WordPress plugin security from both attack and defense sides

blind vulnerabilities injection out-of-band SQL

What is a blind vulnerability and how can it be exploited and detected? 

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet woman in security

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

CSP response headers

Content Security Policy (CSP) explained including common bypasses