Search What is Detectify?
×

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP TOP 10: Security Misconfiguration

OWASP Top 10 security misconfiguration Vulnerabilities
Data Mining DDoS IT Sec FAQ Malware Phishing Spyware

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Antivirus Detectify Firewall IT Sec FAQ Security Services

IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify?

Examples IDOR Insecure Direct Object Reference OWASP Top 10 Remediation Well-known events

OWASP TOP 10: Insecure Direct Object Reference

encryption IT Sec FAQ SSL

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted?

Cross site scripting OWASP Top 10 Vulnerabilities XSS

OWASP TOP 10: Cross-site Scripting – XSS

OWASP Top 10 Vulnerabilities XSS

OWASP TOP 10: Broken Authentication

IT Sec FAQ OWASP Top 10 Vulnerabilities

IT Security FAQ 7: What is OWASP Top 10?

Facebook IT Sec FAQ Vulnerabilities WordPress

IT Sec FAQ

IDOR OWASP Top 10 Vulnerabilities XSS

OWASP Top 10 Vulnerabilities Explained