Search What is Detectify?
×

Web security

Detectify’s web security blog delivers common vulnerabilities knowledge including OWASP, our security research, and the basics of web application security.

OWASP Top 10 Vulnerabilities Explained

IDOR OWASP Top 10 Vulnerabilities XSS
Facebook IT Sec FAQ Two-factor authentication

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

SQL Injection Vulnerabilities

What is an SQL Injection and how do you fix it?

IT Sec FAQ KeePass Password Managers Password Safe

IT Security FAQ 3: What password-managers are good? Why should you use one?

IT Sec FAQ Plugins WordPress

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

CMS Joomla Vulnerabilities

Joomla security

Facebook IT Sec FAQ

IT Security FAQ 1: What should you think about when approving an app on Facebook?

CSRF Security Vulnerabilities WordPress XSS

Vulnerabilities

Ethical Hacking Karim Rahal Responsible Disclosure Program Spotify

Guest blog: Karim Rahal on a Spotify playlist hack

CMS Vulnerabilities WordPress Yoast

Updates on the security status of WordPress and Yoast

Cross site scripting Remediation Vulnerabilities XSS

What is Cross-site Scripting (XSS) and how can you fix it?