Introducing Dynamic API Scanning
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
Victor Arellano
We know that most security teams today handle a backlog of thousands of vulnerabilities. We also know that not all of these vulnerabilities pose a significant risk to your organization, whether or not they have a high severity score or are present on a business-critical asset. We’ve spoken with dozens of security teams over the last few months and have learned that filtering vulnerabilities across several factors is critical to accelerating remediation.
We’re excited to introduce the new Vulnerabilities page to all customers (including those in an active trial). The new Vulnerabilities page provides a more holistic overview of the current state of the vulnerabilities present on your attack surface. Users can now view, sort, filter, and export findings using this page.
Whether you’re a seasoned user or new to Detectify, you’re probably familiar with how to use our previous Vulnerabilities page. Nevertheless, with this new update, you have access to some powerful capabilities that weren’t previously available.
Combining multiple filters to narrow down vulnerability information makes it possible to address the threats on web applications you know are most business-critical. These can then be exported as and when needed.
“I want to know about high and critical severity vulnerabilities on my business-critical applications.”
Suppress findings you know aren’t an issue for your organization. Now, you can filter your attack surface for certain vulnerability types or even severity scores you don’t want to see again and more easily mark them as an acceptable risk.
Here is a list of all new modules recently added from our community of ethical hackers. You can find a complete list of new vulnerabilities added to Surface Monitoring and Application Scanning by viewing the “What’s New?” section in-tool.
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
The average organization is missing testing 9 out of 10 of their complex web apps that are attacker-attractive targets. To address this, we’re launching new …