Search What is Detectify?
×

Web security

Learn about the most common vulnerabilities, our security research, and the basics of staying safe online.

OWASP Top 10 Vulnerabilities Explained

IDOR OWASP Top 10 Vulnerabilities XSS
IBM oracle weblogic RCE security updates WordPress XSS

Detectify security updates for 19 October

Bug Bounty Bugcrowd Grant McCracken interview

Q&A with Grant McCracken, Bugcrowd: “You might be thinking, do I want people to hack me? The answer is yes!”

featured iframe busters XSS

Iframe busters lead to XSS on 2% of all websites

best practices podcast web security

Web security podcasts we are currently listening to

Detectify Crowdsource OWASP Top 10 Vulnerabilities Workflow

4 ways your company benefits from investing in web app security

Bug Bounty Crowdsourced security Detectify Crowdsource Ethical Hacking Responsible Disclosure Program Vulnerabilities White hat

3 ways white-hat hackers can help you protect your website

OWASP Top 10 XXE

OWASP TOP 10: XXE

broken access control OWASP Top 10 Vulnerabilities

OWASP TOP 10: Broken Access Control

Insufficient Logging and Monitoring OWASP Top 10 Vulnerabilities

OWASP TOP 10: Insufficient Logging and Monitoring

Detectify Risto Siilasmaa Security

Risto Siilasmaa: “We have to assume that the bad guys will get in”