109 blog posts published by month since the start of 2022. Start from a different year:

Posts year-to-date
25 (8 posts by this month last year.)
Average posts per month since 2022
2.3

Post details (2022 to today)

Title Author Date Word count HN points
Redefining AppSec Testing with Intelligent Scan Recommendations and Asset Classification Detectify Apr 24, 2025 29 -
A practitioner’s guide to classifying every asset in your attack surface Detectify May 13, 2025 2932 -
How our new engine framework helped address a critical vulnerability within the day Dan Eidmark & André Schaffer Nov 18, 2024 1680 -
EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance Cecilia Wik Jun 03, 2025 2754 -
How Detectify embraces the best of both DAST and ASM Detectify Feb 10, 2025 1104 -
DNS is the center of the modern attack surface – are you protecting all levels? Rickard Carlsson Mar 18, 2025 1575 -
Security Update: Publicly Exposed Ingress NGINX Admission Detectify Mar 26, 2025 521 -
Making security a business value enabler, not a gatekeeper Detectify Feb 25, 2025 1169 -
Introducing Alfred for fully autonomous AI-built vulnerability assessments Detectify Mar 10, 2025 802 -
Detectify sees significant increase in detected vulnerabilities powered by its Crowdsource community Detectify Jan 27, 2022 773 -
Detectify year in review 2024 Detectify Dec 18, 2024 1108 -
Improvements to the IP page – more flexibility and new methods to interact with data Victor Arellano Sep 21, 2023 532 -
Significant changes to attack surface overview and many new tests Victor Arellano Mar 08, 2024 461 -
An ethical hacker’s perspective on EASM Gunnar Andrews Jan 04, 2023 1104 -
Product comparison: Detectify vs. Intruder Detectify Sep 10, 2025 200 -
Better attack surface filtering and subdomain discovery Victor Arellano Jul 08, 2022 377 -
Improvements to boost the attack surface view, ports & more Victor Arellano Apr 29, 2022 583 -
Newly minted filters, improvements to bulk actions, and SSL assessments Victor Arellano May 10, 2022 456 -
Improvements to fingerprinted technologies, IP data, and the attack surface Victor Arellano Oct 30, 2023 412 -
Inside the tech that continuously monitors our customers’ attack surface Dan Eidmark \u0026 André Schaffer Jan 09, 2025 1949 -
Product comparison: Detectify vs. Nessus Detectify Sep 18, 2025 261 -
Major improvements to integrations Victor Arellano Jun 29, 2023 408 -
Performance improvements, snappier ports, and spring cleaning Victor Arellano May 24, 2022 432 -
Meet the Hacker: Goonjeta Malhotra Detectify Mar 07, 2022 1464 -
Alerts on policy breaches now available via API Victor Arellano Jul 03, 2024 560 -
3x more subdomain takeovers now discovered Victor Arellano Oct 06, 2022 734 -
The role of attack surface management to bolster data breach protection Detectify May 31, 2022 1599 -
Product comparison: Detectify vs. Burp Enterprise Detectify Sep 26, 2025 243 -
Introducing Dynamic API Scanning Detectify Sep 02, 2025 745 -
Here’s how Detectify and Penetration Testing compare Charlotte Kerridge Jul 25, 2023 680 -
Resolving prioritization issues faced by modern AppSec teams with EASM Grace Macej Mar 17, 2023 708 -
How does EASM differ from CAASM and DRPS? Hakluke Mar 08, 2023 1550 -
Phishing, OWASP, EASM, and hacking WordPress – top themes from Hack Yourself London Detectify May 04, 2022 1713 -
View vulnerabilities on the Attack Surface page, new Overview, and update to Attack Surface Custom Policies Victor Arellano Jul 06, 2023 592 -
Major update to Attack Surface Custom Policies Victor Arellano Apr 28, 2023 478 -
Improvements to the attack surface overview Victor Arellano Dec 14, 2023 423 -
Detectify Raises $10M in follow-on funding Detectify Sep 29, 2022 609 -
Recently added crowdsourced vulnerabilities – September 2023 Detectify Sep 27, 2023 249 -
How to set up Attack Surface Custom Policies Victor Arellano Oct 18, 2022 691 -
Busting browser fails: What attackers see when they hack your employees’ browser David Jacoby Jul 18, 2022 2465 -
Why incorporating web application scanning capabilities with asset monitoring makes a complete EASM solution Hakluke Apr 06, 2023 698 -
Security Update: Ivanti Connect Secure (CVE-2025-0282) Detectify Jan 13, 2025 162 -
Detectify Security Advisor explains account hijacking attack scenarios using abnormal OAuth-flows Detectify Jul 06, 2022 527 -
Security Update: Spring4Shell vulnerability modules already scanning on Detectify Detectify Apr 01, 2022 557 -
New e-book: Do you know what External Attack Surface Management is? Detectify Oct 07, 2022 360 -
Proactively reduce risks with Attack Surface Custom Policies Detectify Oct 18, 2022 1488 -
Shortcomings with CVE-overreliance and flaws in security scoring systems Charlotte Kerridge Dec 18, 2023 664 -
Enriched attack surface view, DNS filtering, and more Victor Arellano Jun 15, 2022 339 -
How attack surface management helps during an M&A process Detectify Sep 05, 2022 995 -
How to scan your attack surface with hacker-powered tools Detectify Aug 25, 2022 1027 -
Detectify honored as Market Leader in Attack Surface Management in Global InfoSec Awards - Apr 24, 2023 377 -
Jobs-to-be-Done: See the current state of security and understand what is exposed and how it has evolved over time Charlotte Kerridge Oct 09, 2023 988 -
Get to know our new Domains page Victor Arellano Oct 14, 2024 573 -
How to interpret your Detectify score Detectify Feb 14, 2022 1050 -
See technologies on the attack surface plus updates to Attack Surface Custom Policies and API keys Victor Arellano Dec 01, 2022 613 -
Improving domain discovery with new connectors Victor Arellano Feb 01, 2024 629 -
Major improvement to web crawling, customization, and new test Rickard Carlsson Jan 30, 2023 446 -
Product update: Dynamic API Scanning, Recommendations & Classifications, and more Detectify Sep 26, 2025 549 -
Detectify’s approach to asset discovery is at the forefront of the security landscape Grace Macej May 05, 2023 906 -
Top 3 mistakes when implementing an External Attack Surface Management (EASM) program Hakluke Mar 01, 2022 975 -
Gartner’s top security threat and pentesting vs continuous scans – what you missed from Hack Yourself Stockholm 2021 Detectify May 18, 2022 739 -
Detectify among top 5% over time in tech industry for employee wellbeing Kristoffer Jaworska Persson Aug 02, 2022 1342 -
4 fundamental questions on EASM — and how Detectify’s solution answers them Hakluke Jan 20, 2023 909 -
All in on flexible and efficient integrations Victor Arellano Oct 04, 2024 788 -
Sending billions of daily requests without breaking things with our rate limiter André Schaffer \u0026 Haris Kabiljagic Jan 23, 2025 1631 -
Recently added crowdsourced vulnerabilities – November 2023 Detectify Nov 29, 2023 388 -
Detectify is now available on AWS Marketplace Detectify Apr 22, 2024 290 -
Job-to-be-Done: Understand what is being continuously tested and monitored across my attack surface Charlotte Kerridge Dec 05, 2023 672 -
Here’s how EASM is filling the gaps missed by AppSec testing solutions Grace Macej Mar 28, 2023 881 -
How women of Detectify are redefining the security sector for the better Detectify Mar 08, 2022 2118 -
Improvements to scheduled scans, freshly added tests, and more Victor Arellano Jun 08, 2022 250 -
Automated certificate assessments now possible Victor Arellano Apr 05, 2023 635 -
More improvements to Attack Surface Custom Policies Victor Arellano Nov 11, 2022 494 -
Security updates to cover your entire attack surface Victor Arellano Mar 29, 2022 578 -
Should your team really run DAST in staging environments? Rickard Carlsson Feb 02, 2023 1059 -
7 things that your EASM platform should be able to do Hakluke Apr 26, 2023 999 -
Attackers vs Defenders: Mind the perspective gap Hakluke Mar 15, 2022 774 -
The trouble with CVEs and vulnerability management in modern tech stacks Rickard Carlsson Jan 05, 2023 1257 -
Detectify strengthens its authority in G2’s security categories Detectify Jun 30, 2022 318 -
State of your attack surface, improved user permissions, and many new tests Victor Arellano Jun 30, 2022 317 -
Spot risks with our new IP view Victor Arellano Aug 10, 2023 567 -
Quickly access insights about apex domains on the attack surface Victor Arellano Aug 03, 2022 346 -
Job-to-be-Done: Quickly resolve exposures and vulnerabilities Charlotte Kerridge Oct 27, 2023 1121 -
Now possible to group assets, from domains to technologies Victor Arellano Dec 23, 2022 563 -
Detectify’s journey to an AWS multi-account strategy Haris Kabiljagic Apr 13, 2023 2230 -
Detectify product highlights and other major developments in 2023 Charlotte Kerridge Dec 19, 2023 1048 -
Improved navigation to the attack surface and scan settings Victor Arellano Jul 19, 2022 337 -
Detectify continues consolidating its authority in G2’s security categories Detectify Oct 05, 2022 492 -
Security Update: Critical CUPS Vulnerability - Sep 27, 2024 485 -
Infinite payloads? The future of API Testing with dynamic fuzzing Detectify Sep 18, 2025 1091 -
Launching new domains view and enhanced policies for unprecedented control over attack surface data Detectify Jun 07, 2024 315 -
How to Prevent a Subdomain Takeover in Your Organization Detectify Jan 22, 2025 2176 -
Vulnerabilities page updates: Major improvements to accelerate remediation Victor Arellano Mar 16, 2023 533 -
Assign severity ratings on Attack Surface Custom Policies Victor Arellano May 12, 2023 406 -
Introducing Jobs-to-be-Done: a way to help our users achieve their goals Charlotte Kerridge Sep 28, 2023 570 -
Ethical hacker: CISOs have more to worry about than a zero day exploit David Jacoby Apr 14, 2022 1894 -
Subteams functionality through the Detectify API Victor Arellano Jun 09, 2022 197 -
Why is securing the external attack surface a hot topic for security experts right now? Ryan Rudder Feb 23, 2022 1170 -
Shifting left is great, but shifting right is more cost-effective Rickard Carlsson Nov 23, 2022 1099 -
[New research] Subdomain takeovers are on the rise and are getting harder to monitor Detectify Mar 22, 2022 771 -
Detectify wins 2022 Fortress Cyber Security Award Detectify Jun 07, 2022 367 -
Product comparison: Detectify vs. Qualys Detectify Oct 03, 2025 188 -
Challenges when implementing an AWS multi-account strategy Haris Kabiljagic Jul 12, 2023 1190 -
Product comparison: Detectify vs. Tenable Detectify Oct 10, 2025 270 -
Why API security is different (and why it matters) Joviane Jardim Oct 14, 2025 686 -
Product comparison: Detectify vs. Escape Detectify Oct 20, 2025 180 -
New API testing category now available Detectify Oct 23, 2025 778 -
Migrating Critical Messaging from Self-Hosted RabbitMQ to Amazon MQ Maurits Johansson Oct 23, 2025 3034 -
The API vulnerabilities nobody talks about: excessive data exposure Joviane Jardim Oct 28, 2025 1236 -