Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. This issue covers the weeks from November 6th to November 19th Intigriti News From my notebook
The post Bug Bytes #217 – How to Submit Vulnerabilities, Writing a Great WriteUp and 2 years of Bug Bounty appeared first on Intigriti.
We’ve made several improvements to how users can interact with their fingerprinted technologies data, grouping IP data by several parameters, and viewing the latest changes ...
The post Improvements to fingerprinted technologies, IP data, and the attack surface appeared first on Blog Detectify.
It’s not unlikely that your team has a sufficient amount of vulnerability data that they must assess, prioritize, and remediate. Whether that’s a newly discovered ...
The post Job-to-be-Done: Quickly resolve exposures and vulnerabilities appeared first on Blog Detectify.
How do you see the current state of security in your organization when security is constantly evolving? New assets, vulnerabilities, and even human errors like ...
The post Jobs-to-be-Done: See the current state of security and understand what is exposed and how it has evolved over time appeared first on Blog Detectify.
As someone working within AppSec or ProdSec security, the scope and responsibilities of your role have likely changed over the last few years. This is ...
The post Introducing Jobs-to-be-Done: a way to help our users achieve their goals appeared first on Blog Detectify.
Here is a list of all new modules recently added from our community of ethical hackers. You can find a complete list of new vulnerabilities ...
The post Recently added crowdsourced vulnerabilities – September 2023 appeared first on Blog Detectify.
We know how frustrating it can be to discover new assets that don’t follow your internal security policies, such as using a geolocation that isn’t ...
The post Improvements to the IP page – more flexibility and new methods to interact with data appeared first on Blog Detectify.
The post Spot risks with our new IP view appeared first on Detectify Blog.
Customers often tell us of instances where someone in their team spins up a new machine that isn’t using an approved geolocation, or that they ...
The post Spot risks with our new IP view appeared first on Blog Detectify.
“How does Detectify’s External Attack Surface Management platform compare to Penetration testing” or “What I’m really looking for is Penetration testing” are two statements we ...
The post Here’s how External Attack Surface Management and Penetration Testing compare appeared first on Blog Detectify.