Search What is Detectify?

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP TOP 10: Broken Authentication

OWASP Top 10 Vulnerabilities XSS
IT Sec FAQ OWASP Top 10 Vulnerabilities

IT Security FAQ 7: What is OWASP Top 10?

Facebook IT Sec FAQ Vulnerabilities WordPress


IDOR OWASP Top 10 Vulnerabilities XSS

OWASP Top 10 Vulnerabilities Explained

IT Sec FAQ Vulnerabilities

IT Security FAQ 6: What CMS is the most vulnerable?

OWASP Top 10 SQL Injection Vulnerabilities

OWASP TOP 10: Injection

CMS WordPress

WordPress Security

CMS WordPress

How to Improve Your WordPress Security: Plugins and Themes

Bug Bounty Ethical Hacking IT Sec FAQ White hat

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

CMS WordPress

How To Improve Your WordPress Security