Posts | Rating | |
7 SecOps Trends That Could Shape Your Security in 2022 | 0 user ratings | 2023-08-20 15:54:28 By: milo |
Crowdsourced security is now a need, not a nice to have | 0 user ratings | 2023-08-20 15:54:28 By: milo |
[New research] SSL certificates could be leaking company secrets | 0 user ratings | 2023-08-20 15:54:28 By: milo |
How tech managers can make sure security isn t left off the list this holiday season | 0 user ratings | 2023-08-20 15:54:27 By: milo |
New test added for actively exploited critical CVE-2021-44228 Apache Log4j RCE | 0 user ratings | 2023-08-20 15:54:27 By: milo |
Press information: Detectify sees significant increase in detected vulnerabilities powered by its Crowdsource community | 0 user ratings | 2023-08-20 15:54:26 By: milo |
Why is securing the external attack surface a hot topic for security experts right now? | 0 user ratings | 2023-08-20 15:54:26 By: milo |
How women of Detectify are redefining the security sector for the better | 0 user ratings | 2023-08-20 15:54:25 By: milo |
Security updates to cover your entire attack surface | 0 user ratings | 2023-08-20 15:54:24 By: milo |
[New research] Subdomain takeovers are on the rise and are getting harder to monitor | 0 user ratings | 2023-08-20 15:54:24 By: milo |
Security Update: Spring4Shell Vulnerability Modules Already Scanning on Detectify | 0 user ratings | 2023-08-20 15:54:24 By: milo |
Phishing, OWASP, EASM, and hacking WordPress top themes from Hack Yourself London | 0 user ratings | 2023-08-20 15:54:23 By: milo |
Newly minted filters, improvements to bulk actions, and SSL assessments | 0 user ratings | 2023-08-20 15:54:23 By: milo |
The role of attack surface management to bolster data breach protection | 0 user ratings | 2023-08-20 15:54:22 By: milo |
Gartner’s top security threat and pentesting vs continuous scans – what you missed from Hack Yourself Stockholm 2021 | 0 user ratings | 2023-08-20 15:54:22 By: milo |
Detectify wins 2022 Fortress Cyber Security Award | 0 user ratings | 2023-08-20 15:54:21 By: milo |
Detectify Security Advisor explains account hijacking attack scenarios using abnormal OAuth-flows | 0 user ratings | 2023-08-20 15:54:20 By: milo |
Detectify strengthens its authority in G2 s security categories | 0 user ratings | 2023-08-20 15:54:20 By: milo |
Quickly access insights about apex domains on the attack surface | 0 user ratings | 2023-08-20 15:54:18 By: milo |
Detectify continues consolidating its authority in G2 s security categories | 0 user ratings | 2023-08-20 15:54:17 By: milo |
Proactively reduce risks with Attack Surface Custom Policies | 0 user ratings | 2023-08-20 15:54:16 By: milo |
Now possible to group assets, from domains to technologies | 0 user ratings | 2023-08-20 15:54:15 By: milo |
See technologies on the attack surface plus updates to Attack Surface Custom Policies and API keys | 0 user ratings | 2023-08-20 15:54:15 By: milo |
The trouble with CVEs and vulnerability management in modern tech stacks | 0 user ratings | 2023-08-20 15:54:14 By: milo |
Vulnerabilities page updates: Major improvements to accelerate remediation | 0 user ratings | 2023-08-20 15:54:13 By: milo |