Category: Technobabble

John Mick, Developer, Afonso: “Automation makes you smarter, not lazier”

John Mick, Developer, Afonso: “Automation makes you smarter, not lazier”

Automation doesn’t lead to laziness, at least when it comes to security. Everyone (or everyone we like) wants a better, more secure web. You’re definitely aware of the need to prevent malicious attacks and data breaches, but unless you have...

/ September 11, 2015
Detectify @ DEF CON 2015

Detectify @ DEF CON 2015

Frans @fransrosen and Fredrik @almroot from the Detectify team visited the 23rd annual DEF CON Hacker Conference, as usual hosted in Vegas, in beginning of August. This year was the big eye opener for car hacking with the hacking of...

/ August 24, 2015
Release: You are now able to add your own subdomains

Release: You are now able to add your own subdomains

In the latest release, we launched the possibility to add your own subdomains without verifying them separately. Since before we have been able to look for the most common subdomains, but now you can add your own custom subdomains. By...

/ August 12, 2015
Release: Improved PDF report and new WordPress vulnerabilities

Release: Improved PDF report and new WordPress vulnerabilities

We are continuously developing our scanner and service. In the latest release we have added a new improved PDF report which now has an executive summary. We have also added a couple of new vulnerabilities for WordPress. New improved PDF...

/ July 17, 2015
Team event – Detectify Sailing

Team event – Detectify Sailing

The Detectify team took a day off in order to explore the archipelago outside Stockholm from the sea side. It was a great day blessed with sunshine and just enough sea breeze. The sailing took us from Saltsjöbaden and on...

/ July 14, 2015
Release: New report view and verification through Google Tag Manager

Release: New report view and verification through Google Tag Manager

Feature updates that has been made possible by our new backend continues to be launched. The new features includes a new improved alternative report view that enables you to get a better overview of your vulnerabilities. The second big new...

/ June 12, 2015
Release 2015-05-27: New Magento exploits and the start of workflow capabilities

Release 2015-05-27: New Magento exploits and the start of workflow capabilities

You are now starting to see some of results of the updated backend. The introduction of the first step towards a workflow tool with tags. We did include multiple Magento specific vulnerabilities. Our phpMyAdmin modules also got an update. Workflow...

/ May 27, 2015
Release 2015-05-13: New report layout and large changes under the hood

Release 2015-05-13: New report layout and large changes under the hood

The last few months we have put a lot of effort in improving our backend. From the outside the main change is the new format for the reports. The reports now contains both better and more data than before. Here...

/ May 13, 2015

Release 2015-03-27: Two static scanner IPs

A lot of people have requested a list of IPs they can whitelist in their firewall and blacklist in their analytics program. Before this release our scanners could come from any Amazon IP in Ireland. Now all traffic is always...

/ March 30, 2015

Release 2015-03-13

We do frequent updates to the Detectify tool, however in the past we have not been transparent with the updates. We are typically releasing a new version every two weeks with new functionality and is now planning to provide a...

/ March 17, 2015
Awards to Detectify’s team members

Awards to Detectify’s team members

Team members of Detectify have received not one, but two, public awards over the last few weeks. We are proud of having skilled people in Detectify. Super talents of 2015 Our two team members Rickard Carlsson and Fredrik Almroth was...

/ March 13, 2015
Security testing behind login

Security testing behind login

A comprehensive security evaluation of any web application needs to be able to test areas behind a login. Find out more about two common methods of login/authentication are Basic auth and HTML forms. Most web applications have areas that are...

/ August 27, 2014