Search What is Detectify?

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP TOP 10: Missing Function Level Access Control

Examples Missing Function Level Access Control OWASP Top 10 Remediation
OWASP Top 10 sensitive data exposure Vulnerabilities

OWASP TOP 10: Sensitive Data Exposure


IT Security FAQ: what should you do to protect yourself online? What is the number one everyday mistake people make?


Misconfigured email servers open the door to spoofed emails from top domains

OWASP Top 10 security misconfiguration Vulnerabilities

OWASP TOP 10: Security Misconfiguration

Data Mining DDoS IT Sec FAQ Malware Phishing Spyware

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Antivirus Detectify Firewall IT Sec FAQ Security Services

IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify?

Examples IDOR Insecure Direct Object Reference OWASP Top 10 Remediation Well-known events

OWASP TOP 10: Insecure Direct Object Reference

encryption IT Sec FAQ SSL

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted?

Cross site scripting OWASP Top 10 Vulnerabilities XSS

OWASP TOP 10: Cross-site Scripting – XSS