Sep. 2013 |
Detectify iOS7 bypass with control center DISABLED |
oYEn91cvNcA |
Sep. 2013 |
Detectify testing the iOS7 bypass with calculator and voice control |
lBWDBFdgh6w |
Oct. 2015 |
Teaser Detectify and Server Density SaaS Security Hangout |
yYc43mK-c0U |
Dec. 2015 |
Detectify - Security Webinar |
Vbf8dBgccrs |
Dec. 2015 |
Detectify CEO Rickard Carlsson interviewed by SUP46 |
S13ZKviX4TY |
Jan. 2016 |
Detectify Demo Session - Tuesday 26th - 11.00 CET |
sLOuBQQ8N2k |
Feb. 2016 |
Detectify pitch at Startup Panel at CIO Trend 2016 (in Swedish) |
elelYpWTKsI |
Feb. 2016 |
I HUVUDET PÅ EN WHITE HAT - Frans Rosén, Knowledge Advisor, Detectify på Säkerhetsdagen |
rnrntSB6pnc |
Nov. 2016 |
Our experts explain Detectify Crowdsource |
trbDBuyqlrs |
Feb. 2017 |
Martina Janevska Presentation at Swetugg |
jyKqwlQMvwk |
Mar. 2017 |
Detectify for agencies |
8QX3hEMS2w4 |
Mar. 2017 |
What is Detectify? |
WpCY-ZMq36g |
Mar. 2017 |
Detectify Crowdsource |
Nyvcb3N5jzo |
May. 2017 |
What is an Open Redirect? | OWASP Top 10 2013 | Video by Detectify |
TswO4ULUtKY |
Jun. 2017 |
What is a CSRF? | OWASP Top 10 2013 | Video by Detectify |
5joX1skQtVE |
Jun. 2017 |
What is IDOR? | OWASP Top 10 2013 | Video by Detectify |
TRDyvgkBcUs |
Aug. 2017 |
Overview |
PTfNU77NdQs |
Aug. 2017 |
Add a scan profile |
xNuDk_RSKIM |
Aug. 2017 |
Add a domain |
B2aNgW7aXIU |
Aug. 2017 |
Domains & Profiles |
ox2JaSJGg5k |
Aug. 2017 |
Sharing/Exporting Findings |
kEhl7_cEvUo |
Aug. 2017 |
Integrations |
b611rRHj3f4 |
Aug. 2017 |
Teams |
ZeO4xiA0xLA |
Aug. 2017 |
Scan settings |
1Wds-GvQRgY |
Aug. 2017 |
Authentication |
Vt_-mqElJvU |
Aug. 2017 |
Profile Settings |
7ZnBtJbkgfc |
Aug. 2017 |
All Tests |
1oQfhASL2rE |
Aug. 2017 |
OWASP TOP 10 |
Nl77tev1yvo |
Aug. 2017 |
Findings page |
byl5vN9DO7A |
Sep. 2017 |
Using Components with Known Vulnerabilities | OWASP Top 10 2013 | Video by Detectify |
q7FuLs5fnEc |
Sep. 2017 |
What is Detectify? |
PPErCtHyerg |
Oct. 2017 |
What is Missing Function Level Access Control? | OWASP Top 10 2013 | Video by Detectify |
oVV-lSB7ddc |
Oct. 2017 |
What is XSS? | OWASP Top 10 2013 | Video by Detectify |
dwKdf_mq7JY |
Nov. 2017 |
What is Injection? | OWASP Top 10 2017 | Video by Detectify |
Znywg57m2iM |
Dec. 2017 |
Taking over a PayPal account |
C_nMevV7jiw |
Dec. 2017 |
Detectify Happy New Year |
CiyBeQxgTcU |
Feb. 2018 |
What is Insufficient Logging & Monitoring? | OWASP Top 10 2017 | Video by Detectify |
9eCMHYiarx0 |
Mar. 2018 |
What is Security Misconfiguration? | OWASP Top 10 2017 | Video by Detectify |
WQ4svQu0Rn8 |
Apr. 2018 |
Insecure Deserialization | OWASP Top 10 2017 | Video by Detectify |
EzOquQNQAUs |
Jun. 2018 |
How hackers approach Magento sites | Video by Detectify |
0miXTm3vcms |
Jun. 2018 |
Detectify Crowdsource | Meet the Hacker-Gerben Janssen van Doorn |
vpVq6Ba5NeI |
Jul. 2018 |
Detectify | Meet the Hacker - Fredrik Nordberg Almroth |
ERXWb0KjMRo |
Sep. 2018 |
Cross-site scripting (XSS) explained |
WsyswW5F4Io |
Sep. 2018 |
Sender Policy Framework (SPF) explained |
tJ0j39RzXWg |
Oct. 2018 |
Cross-Site Request Forgery (CSRF) explained |
Elj_nfXrMSY |
Nov. 2018 |
Proof of Concept: CVE-2018-2894 Oracle WebLogic RCE |
EfgsdVeq-aI |
Nov. 2018 |
Detectify for security teams |
iImdJP_p4So |
Dec. 2018 |
Detectify for managers |
nWLmYkiYYQ8 |
Dec. 2018 |
Proof of Concept: CVE-2018-9206 jQuery File Upload RCE |
JXxUWj5ybUk |
Mar. 2019 |
Detectify for small businesses |
VDfrVPsANkQ |
Mar. 2019 |
Proof of Concept: CVE-2017-9791 Apache Struts OGNL Expression Injection |
a6knbERs07A |
Apr. 2019 |
Detectify for developers |
9Bw4kU70rks |
May. 2019 |
Proof of Concept: Jenkins RCE / CVE-2018-1000861 & CVE-2019-1003000 |
hIIJq0GLvM0 |
May. 2019 |
Detectify Crowdsource | Meet the Hacker - Linus Särud |
IRFgbW0lfyg |
Nov. 2019 |
Getting started with Detectify |
yWZP1frU9sA |
Feb. 2020 |
Undetected E01, Johan Edholm - Evolution of hacking; Web Security to companies of all sizes. |
79bbLHJx7Iw |
Mar. 2020 |
Undetected E02, Fredrik Almroth - Are Bug Bounties a buzzword? |
Lvp4sWfDnnc |
Jul. 2020 |
Undetected E04, Tom Hudson - Hacking Things Back Together |
OXTCsaOtePc |
Aug. 2020 |
Working at Detectify |
cWfya-D--zk |
Sep. 2020 |
Undetected E05, Cecilia Wik - A Lawyer's Take on Hacking |
_AIkJletqCM |
Feb. 2021 |
Detectify in 17 seconds |
5QuigAc1lks |
Oct. 2021 |
Hack Yourself Stockholm Event (Speaker Lineup) |
ZMIjaRUHETY |
Nov. 2021 |
Hack Yourself Stockholm 2021 Event (Speaker Lineup) |
I15zgF7FLdU |
Nov. 2021 |
Undetected - a web security podcast |
_l0tgn3gokc |
Dec. 2021 |
Hack Yourself Stockholm 2021 - David Jacoby, Jesper Larsson, Mathias Karlsson, and Shane Murnion |
ZKr9Vl_vYz8 |
Jan. 2022 |
Detectify, an ethical hacker powered EASM solution. |
ce0D8TSfqvI |
Mar. 2022 |
Join us on April 7th for Hack Yourself London |
uPPAziFEUnU |
Apr. 2022 |
Katie Paxton-Fear: What trends should CISO's focus on? Hack Yourself London 2022 |
sspP7V5pcL4 |
May. 2022 |
Understanding pentesting vs an automated hacker-powered tool |
RwnnwFtuLvk |
May. 2022 |
What are organizations doing wrong when it comes to security? |
50Am8APtEO8 |
May. 2022 |
Is the perimeter dead? |
gUuskj-LlJI |
May. 2022 |
EASM: Is it late to the party? |
sx5Gnkwi4UY |
Sep. 2022 |
Detectify Product Release: Q3 2022 |
tXcplqqlkXs |
Jan. 2024 |
Getting ISO 27001 certification as a SaaS scale up |
CfEgD9S8nkc |
Jan. 2024 |
HYS '21 Fredrik Almroth Growing attack surface and finding the weakest links |
iU6ePFlDOyo |
Jan. 2024 |
HYS '21 Jonas Lejon The future of external attack surface analysis |
PJNu3Q86krA |
Jan. 2024 |
Winning the battle against vulnerabilities with an EASM tool |
hXKjs6UmHH4 |
Apr. 2024 |
Ports | Detectify Onboarding Series | External Attack Surface Management |
VusV9kBZBlk |
Apr. 2024 |
Attack Surface | Detectify Onboarding Series | External Attack Surface Management |
sC5K-jBe50g |
Apr. 2024 |
Vulnerabilities | Detectify Onboarding Series | External Attack Surface Management |
sfMRblkSrM4 |
Apr. 2024 |
Surface Monitoring | Detectify Onboarding Series | External Attack Surface Management |
YXIM9QBNLAY |
Apr. 2024 |
Getting started | Detectify Onboarding Series | External Attack Surface Management |
xVOUrzXbssc |
Apr. 2024 |
Technologies | Detectify Onboarding Series | External Attack Surface Management |
IHoAbnmxHTs |
Apr. 2024 |
Adding Assets | Detectify Onboarding Series | External Attack Surface Management |
xD6vDEXBAAQ |
Apr. 2024 |
Custom Policies | Detectify Onboarding Series | External Attack Surface Management |
n4-D_qYEeyA |
Apr. 2024 |
Integrations | Detectify Onboarding Series | External Attack Surface Management |
ToEuVlemZWE |
Apr. 2024 |
Overview Page | Detectify Onboarding Series | External Attack Surface Management |
UO0TmuTf-hc |
Apr. 2024 |
All Assets | Detectify Onboarding Series | External Attack Surface Management |
mPI2jpF_bdY |
Apr. 2024 |
Connectors | Detectify Onboarding Series | External Attack Surface Management |
FEpmBAEYqp4 |
Apr. 2024 |
Benefits of Continuous Attack Surface Monitoring | Detectify Onboarding Series |
KXBTY8I9vtM |
Apr. 2024 |
API | Detectify Onboarding Series | External Attack Surface Management |
Cfxddw_GIQk |
Apr. 2024 |
Resources | Detectify Onboarding Series | External Attack Surface Management |
8tv8d2QnPVc |
Apr. 2024 |
Account Management | Detectify Onboarding Series | External Attack Surface Management |
CUqIED1FZMc |
Apr. 2024 |
IP Addresses | Detectify Onboarding Series | External Attack Surface Management |
b79DPLHLhdI |
Apr. 2024 |
Application Scanning | Detectify Onboarding Series | External Attack Surface Management |
k4gxY9f56Uo |