All Articles

Articles in Bug Bounty and IT Security topics.

Traditional pentest vs. bug bounty program: the pros, the cons, and how to do it right
October 24, 2023 · 7 min read

Traditional pentest and bug bounty both have their pros and cons — and for efficient security testing, making the right choice is crucial. Read our comparison.

State of Vulnerability Disclosure: Key learnings from our eBook
September 26, 2023 · 7 min read

Discover the key findings from our survey with security professionals, including the value of VDP for all organizations, the benefits of strong cybersecurity practices, and the importance of positive relationships with ethical hackers.

The illusion of automated vulnerability scans: unveiling the risks and limitations
July 18, 2023 · 6 min read

While automated vulnerability scans provide a quick overview, they often leave critical gaps that can expose businesses to potential risks, giving you a false sense of security. Read our blog post on the limitations of automated vulnerability scans and the steps you can take for a holistic security approach.

Introducing HackGATE: the industry’s first managed gateway for security testing
June 29, 2023 · 4 min read

HackGATE, the industry's first managed gateway for monitoring security testing projects, allows organizations to streamline the auditing process, improve transparency, and separate ethical hackers from real-life attacks, empowering them to take control and ensure comprehensive security testing aligned with industry best practices.

How to protect your company from the unseen risks of AI-generated code
May 24, 2023 · 7 min read

AI-generated code is on the rise, but it comes with a major pitfall: it often contains vulnerabilities that can expose your company to malicious attacks. Read this blog post to learn the main risks of using AI tools to write code — and the steps you need to take to keep your code base secure.

3 key factors to consider for Penetration Testing (as a Service)
May 04, 2023 · 7 min read

Learn the key factors to consider when planning Penetration Testing as a Service. Discover how ethical hackers can help organizations comply with regulatory requirements and industry standards while improving customer confidence and trust in their products and services.

What is Managed Vulnerability Disclosure Policy (mVDP)?
March 03, 2023 · 5 min read

Find out what managed vulnerability disclosure policy is, how it works, and why you should consider using one.

thisclosed_#2
January 16, 2023 · 7 min read

PostgreSQL Database Exfiltration through the abuse of PostgREST requests

thisclosed_#1
January 04, 2022 · 4 min read

Full Account Takeover of ANY user via Insecure Direct Object Reference (IDOR) on reset password functionality

Safety Detectives interview with Hackrate
November 03, 2021 · 3 min read

An interview about our background, offers and competition.