Search Go hack yourself with Detectify
×

Security Culture

It’s time for a new approach to web security. Get inspired with insights from our security experts and thought leaders on how to improve security culture, awareness and visibility.

DevSecOps Smartbear User Stories Workflow

M. Loewinger, Smartbear: “Each product has a DevOps lead who manages Detectify and all its findings”

Detectify Crowdsource Ethical Hacking recon streaak

Guest blog: streaak – my recon techniques from 2019

2019 Detectify Detectify Crowdsource year in review

Detectify year in review 2019

AWS domain security route 53 subdomain monitoring

Detectify Connector with AWS Route 53

cybersecurity awareness privacy web browser security

Cybersecurity Awareness Month – 5 tips for safe browsing

Detectify Crowdsource Paul Dannewitz Plugins WordPress

Improving WordPress plugin security from both attack and defense sides

Stay up-to-date with security insights from our security experts and ethical hackers Subscribe to the Detectify Monthly Round-up newsletter
blind vulnerabilities injection out-of-band SQL

What is a blind vulnerability and how can it be exploited and detected? 

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet woman in security

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

CSP response headers

Content Security Policy (CSP) explained including common bypasses

http headers HTTP response splitting XSS

HTTP response splitting exploitations and mitigations