Source: www.hackerone.com – Author: johnk. In June, sixty-one hackers from thirteen countries gathered (virtually) to hack digital payments platform PayPal as part of HackerOne’s latest virtual...
Day: December 7, 2024
Commerce Giant Shopify Kicks Off 2021 with HackerOne (Virtual) Live Hacking Event: h1-2102 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. As one of the largest commerce platforms in the world, Shopify leads the industry when it comes to trust and security....
The Rise of Misconfiguration and Supply Chain Vulnerabilities – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jobert Abma. Singapore-based telecom firm, Singtel, revealed last week it had suffered a security breach as a result of relying on an...
2020 Hacker Community Year in Review – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jenn Eugenio. Hackers are no stranger to finding creative ways to overcome obstacles, and 2020 presented numerous challenges for them to conquer....
Announcing The Hacker of The Hill – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jenn Eugenio. We are excited to announce that we have partnered with TryHackMe to bring you Hacker Of The Hill (HoTH) on...
5 Learnings From A Conversation With OP Financial Group’s CISO And @mrtuxracer – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a @mrtuxracer, and Teemu...
LINE on Securing the Application Development Lifecycle with Bug Bounties – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Based in Japan, LINE Corporation is dedicated to the mission of “Closing the Distance,” bringing together information, services and people. The...
What Years of AWS Hacking Tells Us About Building Secure Apps – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jobert Abma. Imagine being part of an organization that has a security team that manages risks by saying “no” to change in...
Grab Celebrates 5 Years on HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Just five years ago, leading rideshare, food delivery, and payments company Grab, became one of the first companies in Southeast Asia...
HackerOne Policies Update – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Introduction: During November of this year, you may have noticed a new page on HackerOne: hackerone.com/policies. This page contains the Code...
The World’s Largest Live Hacking Event – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. How can we make this one different? For organizations that operate in the digital space, there’s no such thing as business-as-usual...
Quantifying Risk: How do you measure success in security? – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Every quarter, a CISO has to stand up in front of their leadership and attempt to put a price on something...
12 Days of Hacky Holidays CTF – Source:www.hackerone.com
Source: www.hackerone.com – Author: Ben Sadeghipour. Dear hackers, The Grinch has gone hi-tech this year with the intentions of ruining the holidays and we need you...
VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. 2020 has been an important year for VDP standardization worldwide. Earlier in the year, the U.S. saw the release of the...
Employee Data Access Behaviors Putting Australian Employers At Risk – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Ben Abbott More than 60% of Australian employees admit to bypassing their employer’s cybersecurity policies for convenience, according to identity security vendor...
Micropatchers share 1-instruction fix for NTLM hash leak flaw in Windows 7+ – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Updated Acros Security claims to have found an unpatched bug in Microsoft Windows 7 and onward that can be exploited...
Vulnerability Assessment I A Complete Guide – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Are you wondering about vulnerability assessments? We give a full explanation of what vulnerability assessments are, how they work, and how...
How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into PagerDuty...
How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne.  Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to the...
How HackerOne Positively Influences Zebra’s Software Development Life Cycle – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Dr. Jasyn Voshell, Director for Product and Solution Security at Zebra Technologies, is a power user of HackerOne, with a Vulnerability...
Bug Bounty vs. CTF [Understanding Differences & Benefits] – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. What Are the Differences Between a Bug Bounty and CTF? A bug bounty is a financial reward a company offers to...
HackerOne in DevSecOps – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Hundreds of HackerOne customers use our platform in their application security processes. For the most part, these are organizations using bug...
What is Vulnerability Scanning? [And How to Do It Right] – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Wondering what vulnerability scanning is? We will explain how it works, why you need to do it, and how to do...
60 Days of Insights from the DOD’s Defense Industrial Base Vulnerability Disclosure Program Pilot – Source:www.hackerone.com
Source: www.hackerone.com – Author: elizabeth@hackerone.com. In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite security...
HACK HARD. HAVE FUN. INCREASE SECURITY – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Amazon’s Live Hacking Event with HackerOne At Amazon, ensuring security is essential for earning customers’ trust. As part of Amazon’s ongoing public...
HOW DIGITAL TRANSFORMATION CHANGES AN ORGANIZATION’S SECURITY CHALLENGES – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Last week, HackerOne joined  WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. Both existing organizations making...
MICROSOFT SAYS: RUSSIAN SOLARWINDS HACKERS HIT U.S. GOVERNMENT AGENCIES AGAIN – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. According to the New York Times, Microsoft says the state-backed Russian hacker group Nobelium—the same actor behind the 2020 SolarWinds attacks—took...
Spotlight on the Server-Side – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Server-side request forgery (or SSRF) vulnerabilities can lead to total system compromise and allow access to an organization’s internal or cloud...
5 Secrets of a Mature Vulnerability Management Program from Costa Coffee and Priceline – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. This week HackerOne hosted a series of webinars that asked participants about how they rated their level of vulnerability management maturity....
How HackerOne Helps the Vulnerability Management Process – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. How HackerOne Helps the Vulnerability Management Process HackerOne sees vulnerability management as a process combining software tools and security analyst actions...