Search What is Detectify?
×

Web security

Learn about the most common vulnerabilities, our security research, and the basics of staying safe online.

OWASP Top 10 Vulnerabilities Explained

IDOR OWASP Top 10 Vulnerabilities XSS
CMS security content management system featured open-source

A security overview of Content Management Systems

AWS Azure Cloud security featured Google cloud subdomain takeover

Cloud security basics: 9 security issues to address as you move to cloud services

NGINX security updates Vulnerabilities XSS

Detectify security updates for 31 October

IBM oracle weblogic RCE security updates WordPress XSS

Detectify security updates for 19 October

Bug Bounty Bugcrowd Grant McCracken interview

Q&A with Grant McCracken, Bugcrowd: “You might be thinking, do I want people to hack me? The answer is yes!”

iframe busters XSS

Iframe busters lead to XSS on 2% of all websites

best practices podcast web security

Web security podcasts we are currently listening to

Detectify Crowdsource OWASP Top 10 Vulnerabilities Workflow

4 ways your company benefits from investing in web app security

Bug Bounty Crowdsourced security Detectify Crowdsource Ethical Hacking Responsible Disclosure Program Vulnerabilities White hat

3 ways white-hat hackers can help you protect your website

OWASP Top 10 XXE

OWASP TOP 10: XXE