
OWASP TOP 10: Injection
Update: Based on the OWASP Top 10 2021 proposed, injection now welcomes Cross-site Scripting (XSS) into the group. It’s no longer top of the OWASP list (at #3), however still very prevalent with 274k occurrences in the data analysis. Injection,...

WordPress Security
WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most popular Content Management System (CMS) in use, it is also the most vulnerable CMS platform out there. To learn more...

How to Improve Your WordPress Security: Plugins and Themes
A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be ignored. In this blog post, we explain what is good to take into consideration when installing a plugin or theme,...

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?
Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White Hat hackers look for vulnerabilities and report them, whereas Black Hat hackers have a more mischievous agenda. They are the...

How To Improve Your WordPress Security
WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and themes from developers worldwide. What started out as a very simple blogging platform is now much more. In the early...

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?
Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to access your account – often both with a password and by receiving a code to your phone by text message...

What is an SQL Injection and how do you fix it?
SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker to read, write and delete content in the database. Risk of SQL Injection The attacker...

IT Security FAQ 3: What password-managers are good? Why should you use one?
People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head for every service you are using online. The problem is, that if someone hacks one of the services you are...
![[Integration] You can now integrate Detectify with Trello](https://www.hackerzzz.com/wp-content/uploads/2022/06/integration-you-can-now-integrate-detectify-with-trello-450x300.png)
[Integration] You can now integrate Detectify with Trello
For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to your favourite security to-do list. Let’s take a look at what your reports will look like in Trello: To learn how...

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?
To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual for people to install and activate different plugins. However, it is important to keep in mind that most security breaches...

Inside the head of a white hat hacker
Yesterday, Detectify’s Knowledge Advisor Frans Rosén gave an inspiring talk about white hat hacking and web security at Computer Sweden’s event Säkerhetsdagen 2016 in Stockholm. His four recommendations to the audience were 1)Set up a security contact for your company as soon...

Top 3 takeaways from CIO Trend 2016
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this change is the CIO. The challenges of the evolving CIO role was one of the many topics that were discussed...