Detectify YouTube subscribers count by month

month subscriber count videos count views count
July 2023 2640 73 263868
August 2023 2650 (+0%) 73 265080
September 2023 2650 73 266160
October 2023 2660 (+0%) 73 267358
November 2023 2660 73 268867
December 2023 2660 73 270221
January 2024 2670 (+0%) 73 271502
February 2024 2670 77 273077
March 2024 2670 77 274539
April 2024 2670 95 275965
May 2024 2690 (+1%) 95 277706
June 2024 2700 (+0%) 95 279454
July 2024 2710 (+0%) 95 280839
August 2024 2720 (+0%) 95 282260
September 2024 2720 95 283186
October 2024 2730 (+0%) 95 285032
November 2024 2730 95 285794

Detectify videos published by month

month published title ID
Sep. 2013 Detectify iOS7 bypass with control center DISABLED oYEn91cvNcA
Sep. 2013 Detectify testing the iOS7 bypass with calculator and voice control lBWDBFdgh6w
Oct. 2015 Teaser Detectify and Server Density SaaS Security Hangout yYc43mK-c0U
Dec. 2015 Detectify - Security Webinar Vbf8dBgccrs
Dec. 2015 Detectify CEO Rickard Carlsson interviewed by SUP46 S13ZKviX4TY
Jan. 2016 Detectify Demo Session - Tuesday 26th - 11.00 CET sLOuBQQ8N2k
Feb. 2016 Detectify pitch at Startup Panel at CIO Trend 2016 (in Swedish) elelYpWTKsI
Feb. 2016 I HUVUDET PÅ EN WHITE HAT - Frans Rosén, Knowledge Advisor, Detectify på Säkerhetsdagen rnrntSB6pnc
Nov. 2016 Our experts explain Detectify Crowdsource trbDBuyqlrs
Feb. 2017 Martina Janevska Presentation at Swetugg jyKqwlQMvwk
Mar. 2017 Detectify for agencies 8QX3hEMS2w4
Mar. 2017 What is Detectify? WpCY-ZMq36g
Mar. 2017 Detectify Crowdsource Nyvcb3N5jzo
May. 2017 What is an Open Redirect? | OWASP Top 10 2013 | Video by Detectify TswO4ULUtKY
Jun. 2017 What is a CSRF? | OWASP Top 10 2013 | Video by Detectify 5joX1skQtVE
Jun. 2017 What is IDOR? | OWASP Top 10 2013 | Video by Detectify TRDyvgkBcUs
Aug. 2017 Overview PTfNU77NdQs
Aug. 2017 Add a scan profile xNuDk_RSKIM
Aug. 2017 Add a domain B2aNgW7aXIU
Aug. 2017 Domains & Profiles ox2JaSJGg5k
Aug. 2017 Sharing/Exporting Findings kEhl7_cEvUo
Aug. 2017 Integrations b611rRHj3f4
Aug. 2017 Teams ZeO4xiA0xLA
Aug. 2017 Scan settings 1Wds-GvQRgY
Aug. 2017 Authentication Vt_-mqElJvU
Aug. 2017 Profile Settings 7ZnBtJbkgfc
Aug. 2017 All Tests 1oQfhASL2rE
Aug. 2017 OWASP TOP 10 Nl77tev1yvo
Aug. 2017 Findings page byl5vN9DO7A
Sep. 2017 Using Components with Known Vulnerabilities | OWASP Top 10 2013 | Video by Detectify q7FuLs5fnEc
Sep. 2017 What is Detectify? PPErCtHyerg
Oct. 2017 What is Missing Function Level Access Control? | OWASP Top 10 2013 | Video by Detectify oVV-lSB7ddc
Oct. 2017 What is XSS? | OWASP Top 10 2013 | Video by Detectify dwKdf_mq7JY
Nov. 2017 What is Injection? | OWASP Top 10 2017 | Video by Detectify Znywg57m2iM
Dec. 2017 Taking over a PayPal account C_nMevV7jiw
Dec. 2017 Detectify Happy New Year CiyBeQxgTcU
Feb. 2018 What is Insufficient Logging & Monitoring? | OWASP Top 10 2017 | Video by Detectify 9eCMHYiarx0
Mar. 2018 What is Security Misconfiguration? | OWASP Top 10 2017 | Video by Detectify WQ4svQu0Rn8
Apr. 2018 Insecure Deserialization | OWASP Top 10 2017 | Video by Detectify EzOquQNQAUs
Jun. 2018 How hackers approach Magento sites | Video by Detectify 0miXTm3vcms
Jun. 2018 Detectify Crowdsource | Meet the Hacker-Gerben Janssen van Doorn vpVq6Ba5NeI
Jul. 2018 Detectify | Meet the Hacker - Fredrik Nordberg Almroth ERXWb0KjMRo
Sep. 2018 Cross-site scripting (XSS) explained WsyswW5F4Io
Sep. 2018 Sender Policy Framework (SPF) explained tJ0j39RzXWg
Oct. 2018 Cross-Site Request Forgery (CSRF) explained Elj_nfXrMSY
Nov. 2018 Proof of Concept: CVE-2018-2894 Oracle WebLogic RCE EfgsdVeq-aI
Nov. 2018 Detectify for security teams iImdJP_p4So
Dec. 2018 Detectify for managers nWLmYkiYYQ8
Dec. 2018 Proof of Concept: CVE-2018-9206 jQuery File Upload RCE JXxUWj5ybUk
Mar. 2019 Detectify for small businesses VDfrVPsANkQ
Mar. 2019 Proof of Concept: CVE-2017-9791 Apache Struts OGNL Expression Injection a6knbERs07A
Apr. 2019 Detectify for developers 9Bw4kU70rks
May. 2019 Proof of Concept: Jenkins RCE / CVE-2018-1000861 & CVE-2019-1003000 hIIJq0GLvM0
May. 2019 Detectify Crowdsource | Meet the Hacker - Linus Särud IRFgbW0lfyg
Nov. 2019 Getting started with Detectify yWZP1frU9sA
Feb. 2020 Undetected E01, Johan Edholm - Evolution of hacking; Web Security to companies of all sizes. 79bbLHJx7Iw
Mar. 2020 Undetected E02, Fredrik Almroth - Are Bug Bounties a buzzword? Lvp4sWfDnnc
Jul. 2020 Undetected E04, Tom Hudson - Hacking Things Back Together OXTCsaOtePc
Aug. 2020 Working at Detectify cWfya-D--zk
Sep. 2020 Undetected E05, Cecilia Wik - A Lawyer's Take on Hacking _AIkJletqCM
Feb. 2021 Detectify in 17 seconds 5QuigAc1lks
Oct. 2021 Hack Yourself Stockholm Event (Speaker Lineup) ZMIjaRUHETY
Nov. 2021 Hack Yourself Stockholm 2021 Event (Speaker Lineup) I15zgF7FLdU
Nov. 2021 Undetected - a web security podcast _l0tgn3gokc
Dec. 2021 Hack Yourself Stockholm 2021 - David Jacoby, Jesper Larsson, Mathias Karlsson, and Shane Murnion ZKr9Vl_vYz8
Jan. 2022 Detectify, an ethical hacker powered EASM solution. ce0D8TSfqvI
Mar. 2022 Join us on April 7th for Hack Yourself London uPPAziFEUnU
Apr. 2022 Katie Paxton-Fear: What trends should CISO's focus on? Hack Yourself London 2022 sspP7V5pcL4
May. 2022 Understanding pentesting vs an automated hacker-powered tool RwnnwFtuLvk
May. 2022 What are organizations doing wrong when it comes to security? 50Am8APtEO8
May. 2022 Is the perimeter dead? gUuskj-LlJI
May. 2022 EASM: Is it late to the party? sx5Gnkwi4UY
Sep. 2022 Detectify Product Release: Q3 2022 tXcplqqlkXs
Jan. 2024 Getting ISO 27001 certification as a SaaS scale up CfEgD9S8nkc
Jan. 2024 HYS '21 Fredrik Almroth Growing attack surface and finding the weakest links iU6ePFlDOyo
Jan. 2024 HYS '21 Jonas Lejon The future of external attack surface analysis PJNu3Q86krA
Jan. 2024 Winning the battle against vulnerabilities with an EASM tool hXKjs6UmHH4
Apr. 2024 Ports | Detectify Onboarding Series | External Attack Surface Management VusV9kBZBlk
Apr. 2024 Attack Surface | Detectify Onboarding Series | External Attack Surface Management sC5K-jBe50g
Apr. 2024 Vulnerabilities | Detectify Onboarding Series | External Attack Surface Management sfMRblkSrM4
Apr. 2024 Surface Monitoring | Detectify Onboarding Series | External Attack Surface Management YXIM9QBNLAY
Apr. 2024 Getting started | Detectify Onboarding Series | External Attack Surface Management xVOUrzXbssc
Apr. 2024 Technologies | Detectify Onboarding Series | External Attack Surface Management IHoAbnmxHTs
Apr. 2024 Adding Assets | Detectify Onboarding Series | External Attack Surface Management xD6vDEXBAAQ
Apr. 2024 Custom Policies | Detectify Onboarding Series | External Attack Surface Management n4-D_qYEeyA
Apr. 2024 Integrations | Detectify Onboarding Series | External Attack Surface Management ToEuVlemZWE
Apr. 2024 Overview Page | Detectify Onboarding Series | External Attack Surface Management UO0TmuTf-hc
Apr. 2024 All Assets | Detectify Onboarding Series | External Attack Surface Management mPI2jpF_bdY
Apr. 2024 Connectors | Detectify Onboarding Series | External Attack Surface Management FEpmBAEYqp4
Apr. 2024 Benefits of Continuous Attack Surface Monitoring | Detectify Onboarding Series KXBTY8I9vtM
Apr. 2024 API | Detectify Onboarding Series | External Attack Surface Management Cfxddw_GIQk
Apr. 2024 Resources | Detectify Onboarding Series | External Attack Surface Management 8tv8d2QnPVc
Apr. 2024 Account Management | Detectify Onboarding Series | External Attack Surface Management CUqIED1FZMc
Apr. 2024 IP Addresses | Detectify Onboarding Series | External Attack Surface Management b79DPLHLhdI
Apr. 2024 Application Scanning | Detectify Onboarding Series | External Attack Surface Management k4gxY9f56Uo

By Matt Makai. 2021-2024.