Search Go hack yourself with Detectify
×

Security Culture

It’s time for a new approach to web security. Get inspired with insights from our security experts and thought leaders on how to improve security culture, awareness and visibility.

blind vulnerabilities injection out-of-band SQL

What is a blind vulnerability and how can it be exploited and detected? 

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet woman in security

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

CSP response headers

Content Security Policy (CSP) explained including common bypasses

http headers HTTP response splitting XSS

HTTP response splitting exploitations and mitigations

automated security CI/CD DAST DevSecOps

Fitting automated security throughout the CI/CD pipeline

open redirect SSRF web vulnerability

The real impact of an Open Redirect vulnerability

Stay up-to-date with security insights from our security experts and ethical hackers Time... to subscribe to the Detectify Monthly Round-up
compliance PCI DSS vulnerability management

What information does Detectify provide for PCI Compliance Requirement 6?

Automation DevSecOps Workflow

Scaling up Security with DevOps and CI/CD practices

DOM XSS Persistent XSS Reflected XSS XSS

What are the different types of XSS?

Detectify Crowdsource EdOverflow Meet the hacker

Meet the Hacker: EdOverflow, motivated by community and knowledge sharing