Category: Technobabble

Beta feature: New and more consistent crawler
Here at Detectify, we love new features, and we know that a lot of our customers do too. That’s why we want to give you a chance to try out what’s new as soon as we build it! Although they...

Basefarm and Detectify enter partnership for better web security
Basefarm, the leading service provider of mission critical applications, and Detectify, a Swedish IT security firm focused on web security, have signed a collaborative deal. Using the collaborative security solution provided by Basefarm and Detectify, customers will be able to...

Meet Detectify!
Our schedule for the autumn and winter is quickly filling up and we’re looking forward to all the awesome events we’ll be attending! In this blog post, you can find our events diary for the next few months, so make sure...

[Release] New dashboard and billing
This week’s release brings a completely overhauled dashboard and billing, giving you a clear overview of your scan profiles’ security status and your team’s billing details. Dashboard The dashboard now includes a list of all scan profiles with an overview of the...

E-commerce Security
Running an e-commerce site does not only require plenty of business savvy, but also a great deal of security awareness. Retailers handle customers’ personal data and online stores need to be as secure and trustworthy as possible in order to...

OWASP TOP 10 2013: Unvalidated Redirects and Forwards
Unvalidated redirects and forwards, also referred to as Open Redirect, is featured on OWASP‘s list of the ten most common vulnerabilities. OWASP is a non-profit organization with the goal of improving the security of software and the internet. We cover their...

[Release] New modules
Security never stands still, which is why we update our service on a regular basis to help you keep up with the latest vulnerabilities. We are constantly working on updating and improving our modules, but you can find some highlights from...

OWASP TOP 10: Using Components with Known Vulnerabilities
Using components with known vulnerabilities is one of the vulnerability categories on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video follows this article. OWASP is a non-profit organization with the goal of improving the security of software...

[Integration] Integrate Detectify with Jira, Github, Instagram and much more using Zapier
Automation should be for everyone, which is why we at Detectify love Zapier. We wanted to make it possible for our customers to use Detectify with their favourite tools, so we have built an integration with one of the internet’s...

General Data Protection Regulation: What It Means For Your Business
Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update and simplify data protection routines for businesses operating in the EU. For some companies, preparing for GDPR compliance entails a...

OWASP TOP 10 2013: Cross-site Request Forgery – CSRF
Cross-site Request Forgery (CSRF) is one of the vulnerabilities on OWASP’s Top 10 list. Its an attack used to make requests on behalf on the user. OWASP is a non-profit organization with the goal of improving the security of software and...

OWASP TOP 10: Missing Function Level Access Control
Missing Function Level Access Control is one of the vulnerabilities on OWASP’s Top 10 list and occurs when authentication checks in request handlers are insufficient. A proof of concept video follows this article. OWASP is a non-profit organization with the goal...