Category: Technobabble

Beta feature: New and more consistent crawler

Here at Detectify, we love new features, and we know that a lot of our customers do too. That’s why we want to give you a chance to try out what’s new as soon as we build it! Although they...

/ August 31, 2016

Basefarm and Detectify enter partnership for better web security

Basefarm, the leading service provider of mission critical applications, and Detectify, a Swedish IT security firm focused on web security, have signed a collaborative deal. Using the collaborative security solution provided by Basefarm and Detectify, customers will be able to...

/ August 29, 2016

Meet Detectify!

Our schedule for the autumn and winter is quickly filling up and we’re looking forward to all the awesome events we’ll be attending! In this blog post, you can find our events diary for the next few months, so make sure...

/ August 26, 2016

[Release] New dashboard and billing

This week’s release brings a completely overhauled dashboard and billing, giving you a clear overview of your scan profiles’ security status and your team’s billing details. Dashboard The dashboard now includes a list of all scan profiles with an overview of the...

/ August 25, 2016

E-commerce Security

Running an e-commerce site does not only require plenty of business savvy, but also a great deal of security awareness. Retailers handle customers’ personal data and online stores need to be as secure and trustworthy as possible in order to...

/ August 24, 2016

OWASP TOP 10 2013: Unvalidated Redirects and Forwards

Unvalidated redirects and forwards, also referred to as Open Redirect, is featured on OWASP‘s list of the ten most common vulnerabilities. OWASP is a non-profit organization with the goal of improving the security of software and the internet. We cover their...

/ August 15, 2016

[Release] New modules

Security never stands still, which is why we update our service on a regular basis to help you keep up with the latest vulnerabilities. We are constantly working on updating and improving our modules, but you can find some highlights from...

/ August 12, 2016

OWASP TOP 10: Using Components with Known Vulnerabilities

Using components with known vulnerabilities is one of the vulnerability categories on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video follows this article. OWASP is a non-profit organization with the goal of improving the security of software...

/ August 4, 2016

[Integration] Integrate Detectify with Jira, Github, Instagram and much more using Zapier

Automation should be for everyone, which is why we at Detectify love Zapier. We wanted to make it possible for our customers to use Detectify with their favourite tools, so we have built an integration with one of the internet’s...

/ August 1, 2016

General Data Protection Regulation: What It Means For Your Business

Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update and simplify data protection routines for businesses operating in the EU. For some companies, preparing for GDPR compliance entails a...

/ July 20, 2016

OWASP TOP 10 2013: Cross-site Request Forgery – CSRF

Cross-site Request Forgery (CSRF) is one of the vulnerabilities on OWASP’s Top 10 list. Its an attack used to make requests on behalf on the user. OWASP is a non-profit organization with the goal of improving the security of software and...

/ July 19, 2016

OWASP TOP 10: Missing Function Level Access Control

Missing Function Level Access Control is one of the vulnerabilities on OWASP’s Top 10 list and occurs when authentication checks in request handlers are insufficient. A proof of concept video follows this article. OWASP is a non-profit organization with the goal...

/ July 13, 2016