Search What is Detectify?
×

Web security

Learn about the most common vulnerabilities, our security research, and the basics of staying safe online.

OWASP Top 10 Vulnerabilities Explained

IDOR OWASP Top 10 Vulnerabilities XSS
Let’s encrypt TLS-SNI-01

ACME TLS-SNI-01 shared hosting exploit using Let’s Encrypt

Cloud security Dirty COW Equifax Ransomware S3 Uber Vulnerabilities

7 biggest security news of 2017

CAPTCHA CSRF

CAPTCHA does not prevent CSRF

OWASP Top 10 Vulnerabilities

OWASP Top 10 2017 is here – Injection still #1

Wi-Fi WPA2

WPA2 security flaw puts millions of devices at risk – Here’s how to stay safe

Detectify e-commerce security Magento Magento security Meet the hacker

[VIDEO SEMINAR] Magento security from a hacker’s perspective

Magento security Vulnerabilities

Thousands of vulnerable Magento web stores out there

AWS AWS asset control Detectify S3 S3 bucket

AWS S3 Misconfiguration Explained – And How To Fix It

GDPR IoT regulation

Should we regulate the Internet of Things?

Agency Agency customers Detectify Revenue

Why agencies should work with security (Part 3)