Source: www.hackerone.com – Author: Rana Robillard. Black Lives Matter. During this time, I find myself with a mix of emotions that makes it difficult to focus....
Day: December 8, 2024
There is no room for racism or inequality here. – Source:www.hackerone.com
Source: www.hackerone.com – Author: Marten Mickos. The merciless killing by police of George Floyd laid bare, once again, the institutionalized racism that plagues the USA. It...
Thanks For Being Part Of The Journey to $100 Million in Bounties! – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. By Jobert Abma and Michiel Prins Reaching $100 Million in lifetime bounties paid ($100 Million!) reminded us of how much we...
$100 Million Paid – One Billion in Sight for Hackers – Source:www.hackerone.com
Source: www.hackerone.com – Author: Marten Mickos. One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred...
10 Ways to Hack Your “New Normal” Workweek – Source:www.hackerone.com
Source: www.hackerone.com – Author: Rana Robillard. Our mission at HackerOne is to empower the world to build a safer internet. However, we can’t do that unless...
How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Vulnerability disclosure policies, or VDPs, have become a best practice for all organizations and government agencies. However, some organizations have yet...
Security by the People: Announcing HackerOne’s FedRAMP Authorization – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. In the face of unprecedented cybersecurity threats, governments around the world are searching for creative ways to secure their most precious...
Stay Ahead of Threats With Hacker-Powered Retesting – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Vulnerabilities that go undetected can pose a serious threat to your business. Identifying critical bugs is only the first step in...
PayPal on Creating Strong Relationships with Security Researchers – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. This blog post was written and contributed by Information Security Engineer, Ray Duran, on behalf of the PayPal Bug Bounty team....
Pentesting Beyond Compliance: A Tool to Improve Your Security Posture – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Penetration testing is a good baseline for evaluating system vulnerabilities and an industry best practice that supports routine security hygiene. Many...
What Juneteenth Means at HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: Rana Robillard. This year, the Juneteenth holiday gained wider global recognition. At HackerOne, we kicked off our inaugural Juneteenth celebration with a day...
Reputation, Signal & Impact Calculation Enhancements – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going forward...
Mail.ru Group pays out over $1 million in bounties – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. “It’s not worth building a fence if it can be bypassed just two steps to the side” Mail.ru Group is a...
Mayonaise Joins The Ranks of The Seven-Figure-Earning Hackers – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Congratulations to @mayonaise, the ninth hacker to earn $1 Million hacking for good on the HackerOne platform! Over the past 2...
Celebrating Pride at HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. June is widely recognized as Pride month –an important moment to pause, celebrate, and support our community, employees and friends in...
What to Look For in a Penetration Testing Company – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. What are Penetration Tests? Penetration testing is one of the most widely used techniques for complying with security regulations and protecting...
Announcing the PlayStation Bug Bounty Program – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s blog....
Juneteenth: HackerOne’s Day for Action – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Starting this Friday, June 19th will become HackerOne’s annual Day for Action. For Black Americans and communities of color around the...
Scaling & Prioritizing Product Security with Zendesk – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts representing...
How does Pentesting fit into your overall security strategy? – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Digital transformation has proven that every business is now a software business. In fact, using digital technology to create new business...
How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Feature Chinese tech company employees and government workers are siphoning off user data and selling it online – and even...
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 23 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 23 | Security Affairs newsletter Round 501 by Pierluigi Paganini – INTERNATIONAL EDITION | ...
Security Affairs newsletter Round 501 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 08, 2024 A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles...
RedLine info-stealer campaign targets Russian businesses through pirated corporate software – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini RedLine info-stealer campaign targets Russian businesses through pirated corporate software Pierluigi Paganini December 08, 2024 An ongoing RedLine information-stealing campaign...
8Base ransomware group hacked Croatia’s Port of Rijeka – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 07, 2024 The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and...
AI in Cybersecurity: Insights from Palo Alto Networks Unit 42® – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: The Future of AI & Cybersecurity Robert Rachwald • December 4, 2024 AI in Cybersecurity: Insights from Palo Alto Networks...
Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability Medium CVE-2024-20526 CWE-400 Download CSAF Email Summary A vulnerability...
How to Protect Your Personal Data – Source:www.mcafee.com
Source: www.mcafee.com – Author: McAfee. All your online activity creates a trail of data. And that data tells a story. The story of you. The websites,...
Family-Friendly Online Safety Tips for Summer Vacations – Source:www.mcafee.com
Source: www.mcafee.com – Author: Amy Bunn. Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the...
How to Delete Your Browser History – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Deleting your browsing history has its benefits. For one, it can improve the performance of your device. Secondly, it can...