Search What is Detectify?

Web security blog

How Detectify handles Zero-Day submissions 

0-day Detectify Crowdsource zero-day

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN

Alyssa Herrera Detectify Crowdsource File Disclosure pulse secure SSL VPN

How we tracked down (what seemed like) a memory leak in one of our Go microservices

Backend Developer best practices go memory leak microservices

Detectify now checks for File Disclosure in SSL VPNs – Pulse Secure and Fortinet

Detectify Crowdsource fortinet pulse secure SSL VPN

Introducing Asset Inventory: stay on top of your web asset security

asset inventory asset monitoring product update

Meet the Team: Emelie Andersson – Building a fast-flying sales team

Meet the team Sales woman in security

Bypassing Cloudflare WAF with the origin server IP address

cloudflare Detectify Crowdsource Gwendal Le Coguic WAF

Improving WordPress plugin security from both attack and defense sides

Detectify Crowdsource Paul Dannewitz Plugins WordPress

What is a blind vulnerability and how can it be exploited and detected? 

blind vulnerabilities injection out-of-band SQL

Anne-Marie Eklund Löwinder: “I was good at making others’ code stop running very early on.”

Anne-Marie Eklund Löwinder CISO IIS interview keys to the internet woman in security