Search Go hack yourself with Detectify
×

Vulnerabilities 101

Build upon your application security and web vulnerabilities knowledge with our vulnerabilities 101 articles.

CDN Cross origin Integrity attribute Security

CDNs – Minimize damages if the CDN is hacked

CMS security Security WordPress

The danger of disabling automatic updates on WordPress

best practices Phishing Security

How to identify a phishing email

Active Directory best practices Service desk

The service desk as an attack vector

open redirect OWASP Top 10 unvalidated redirects and forwards

OWASP TOP 10 2013: Unvalidated Redirects and Forwards

CMS components with known vulnerabilities OWASP Top 10 Plugins Vulnerabilities

OWASP TOP 10: Using Components with Known Vulnerabilities

Stay up-to-date with security insights from our security experts and ethical hackers Time... to subscribe to the Detectify Monthly Round-up
CSRF OWASP Top 10 Vulnerabilities

OWASP TOP 10 2013: Cross-site Request Forgery – CSRF

Examples Missing Function Level Access Control OWASP Top 10 Remediation

OWASP TOP 10: Missing Function Level Access Control

OWASP Top 10 sensitive data exposure Vulnerabilities

OWASP TOP 10: Sensitive Data Exposure

OWASP Top 10 security misconfiguration Vulnerabilities

OWASP TOP 10: Security Misconfiguration