Search What is Detectify?
×

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP Top 10 Vulnerabilities Explained

IDOR OWASP Top 10 Vulnerabilities XSS
chain vulnerabilities Cross site scripting CSRF SSRF Vulnerabilities

Do not dismiss the small vulnerabilities!

Let’s encrypt TLS-SNI-01

ACME TLS-SNI-01 shared hosting exploit using Let’s Encrypt

Cloud security Dirty COW Equifax Ransomware S3 Uber Vulnerabilities

7 biggest security news of 2017

CAPTCHA Cross-site request forgery CSRF

CAPTCHA does not prevent cross-site request forgery (CSRF)

OWASP Top 10 Vulnerabilities

OWASP Top 10 2017 is here – Injection still #1

Wi-Fi WPA2

WPA2 security flaw puts millions of devices at risk – Here’s how to stay safe

Detectify e-commerce security Magento Magento security Meet the hacker

[VIDEO SEMINAR] Magento security from a hacker’s perspective

Magento security Vulnerabilities

Thousands of vulnerable Magento web stores out there

AWS AWS asset control Detectify S3 S3 bucket

AWS S3 Misconfiguration Explained – And How To Fix It

GDPR IoT regulation

Should we regulate the Internet of Things?