Search What is Detectify?
×

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP TOP 10: XXE

OWASP Top 10 XXE
broken access control OWASP Top 10 Vulnerabilities

OWASP TOP 10: Broken Access Control

Insufficient Logging and Monitoring OWASP Top 10 Vulnerabilities

OWASP TOP 10: Insufficient Logging and Monitoring

Detectify Risto Siilasmaa Security

Risto Siilasmaa: “We have to assume that the bad guys will get in”

black-hat hacking Responsible Disclosure Program Security Vulnerabilities

Inside the mind of a black-hat hacker

insecure deserialization OWASP Top 10

OWASP TOP 10: Insecure Deserialization

Ethical Hacking Responsible Disclosure Policy Responsible Disclosure Program White-hat hacking

Guide to Responsible Disclosure and Bug Bounty

chain vulnerabilities Cross site scripting CSRF SSRF Vulnerabilities

Do not dismiss the small vulnerabilities!

Let’s encrypt TLS-SNI-01

ACME TLS-SNI-01 shared hosting exploit using Let’s Encrypt

Cloud security Dirty COW Equifax Ransomware S3 Uber Vulnerabilities

7 biggest security news of 2017