Detectify

Jan 21, 2019
2012
Stockholm, Sweden
Feb 8, 2019   |  By Detectify
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.
Feb 5, 2019   |  By Kristian Bremberg
As a website owner or web developer you can control which HTTP-headers your web server should send. The purpose of this article is to shine some light on the different response HTTP-headers that a web server can include in a request, and what impact they have on security for the web browser.
Jan 29, 2019   |  By Eray Mitrani
Eray Mitrani works for Nokia Deepfield where they are providing network analytics and DDoS-protections. He is a security researcher in the Detectify Crowdsource community. In the following guest blog, he goes through the process of finding and submitting his first module to Detectify Crowdsource, which is an authorization bypass.
Jan 24, 2019   |  By Detectify
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.
Jan 18, 2019   |  By Detectify
Not all cybersecurity budgets are made equal, and for some that means having too many or too few tools. For others this means having few employees or being the lone ranger responsible for better security awareness in the company. Here are options that fit every budget.
Jan 2, 2019   |  By Detectify
Great to see you’re interested in using Detectify to check your web application security! Here is a video demo to walk you through the Detectify tool to get started, add a scan profile, integration options, profile settings and show you how each of our features work. This will also show you how to use the API.
Dec 13, 2018   |  By Detectify
This video is proof of concept of CVE-2018-9206 Unauthenticated arbitrary file upload vulnerability and jQuery-File-upload RCE.
Dec 3, 2018   |  By Detectify
Detectify is a web application and domain security tool that gives you an overview of your security status and integrates into the development cycle to increase productivity. WIth a wide range of CICD integrations, Detectify makes it easy to assign remediation tasks to the right team, share security information throughout the organization, and aggregate data for effortless reporting.
Nov 21, 2018   |  By Detectify
Detectify is a web application and domain security tool that supports security teams in their day-to-day work. We work with 150+ handpicked ethical hackers to get access to vulnerabilities beyond the known CVE libraries that are not a sufficient test bed for modern application security.
Nov 13, 2018   |  By Detectify
Detectify is an automated vulnerability scanner that helps you stay on top of threats by testing your web application for 1000+ vulnerabilities. Getting started with Detectify is easy - you can get up and running in a matter of minutes.