Source: www.hackerone.com – Author: johnk. Bug bounty programs are instrumental in categorizing bugs, triaging, prioritizing, and shutting down vulnerabilities before they blow up. Tech companies large...
Day: December 13, 2024
Hacking with Valor: Why We Raised $36.4M with Valor Equity Partners – Source:www.hackerone.com
Source: www.hackerone.com – Author: Marten Mickos. Our civilization is going digital. That’s fantastic. Unfortunately our software is not secure enough to carry a digital and connected...
Upserve Resolves Over 85 Bugs in Two Years Thanks to Hackers – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. It’s been two years since Upserve launched its public bug bounty program on HackerOne. During that time, Upserve’s security team has...
Bringing the Heat to Vegas: Recapping record-breaking h1-702 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Prior to attending Hacker Summer Camp, there were whispers (or roars) of the infestation of grasshoppers in Las Vegas, Nevada. Local...
HackerOne Praised By An Original Hacker – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. A hacker is “one who enjoys the intellectual challenge of creatively overcoming limitations.” No one exemplifies that definition like Steve Gibson,...
Hacker-Powered Data – Security Weaknesses and Embracing Risk with HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to...
Don’t Believe These 4 Bug Bounty Myths – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat down...
Black Hat 2019: Highlights from the Biggest and Best Yet – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions, innovative...
The Security Vendors Startups like Lob Can’t Live Without – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Source: https://twitter.com/arkadiyt/status/1144842849135079424 We love hearing that customers can’t live without us. Who doesn’t? It’s especially gratifying coming from a repeat customer like...
GraphQL Week on The Hacker101 Capture the Flag Challenges – Source:www.hackerone.com
Source: www.hackerone.com – Author: Cody Brocious. What do Netflix, Intuit, Facebook, PayPal, and HackerOne all have in common? All these companies, and many others, have adopted...
Live Hacking Events: Stats, invitations, and what’s next – Source:www.hackerone.com
Source: www.hackerone.com – Author: luke. Our tagline, “Together We Hit Harder” is born of the belief that when hackers and security teams are connected, security improves....
London Called, Hackers Answered: Recapping h1-4420 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. On an unseasonably sunny summer day, hackers from around the world descended on London, England, not to see an unobstructed view...
North Korea’s fake IT worker scam hauled in at least $88 million over six years – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood North Korea’s fake IT worker scams netted the hermit kingdom $88 million over six years, according to the US Department...
Apache issues patches for critical Struts 2 RCE bug – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones We now know the remote code execution vulnerability in Apache Struts 2 disclosed back in November carries a near-maximum severity...
Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The Europol-coordinated Operation PowerOFF struck again this week as cross-border cops pulled the plug on 27 more domains tied to...
British Army zaps drones out of the sky with laser trucks – Source: go.theregister.com
Source: go.theregister.com – Author: Dan Robinson The British Army has successfully destroyed flying drones for the first time using a high-energy laser mounted on an armored vehicle. If...
Snowflake Will Make MFA Mandatory Next Year – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Cloud warehousing firm Snowflake is making multifactor authentication (MFA) mandatory for all users next year through a phased approach that...
Achieving CyberSecure Canada Certification – Source: securityboulevard.com
Source: securityboulevard.com – Author: Enzoic Understanding CyberSecure Canada CyberSecure Canada is a federal cybersecurity certification program developed by the Canadian Centre for Cyber Security. It aims to help small and...
What Is an Application Vulnerability? 8 Common Types – Source: securityboulevard.com
Source: securityboulevard.com – Author: Legit Security Every application is susceptible to attacks, but web applications are more vulnerable than others. They interact with more networks and...
Understanding the Role of AI in Cybersecurity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Legit Security Artificial intelligence (AI) is reshaping the cybersecurity landscape—both potential attacks and impactful protections. Understanding how AI can be used in...
10 Container Security Best Practices: A Guide – Source: securityboulevard.com
Source: securityboulevard.com – Author: Legit Security Containers boost your application’s scalability and efficiency. But without proper security, containerized environments can be vulnerable to data breaches, supply...
What’s a Zero-Day Vulnerability? Prevent Exploits and Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Legit Security Zero-day vulnerabilities are serious threats. They’re completely unknown to both the vendor and the user. That gives attackers a significant...
7 Must-Have Salesforce Security Practices – Source: securityboulevard.com
Source: securityboulevard.com – Author: Brittany Bodane, Product Marketing Manager, AppOmni Critical Salesforce Data Protection. Real-Time Risk Detection at Scale. OUR VALUE TO SALESFORCE CUSTOMERS AppOmni empowers...
Holding Back Salt Typhoon + Other Chinese APT CVEs – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Garland Over the past several years, US Federal Agencies and private sector companies have observed China-based threat actors targeting network and...
Charges Against CISOs Create Worries, Hope in Security Industry: Survey – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A U.S. District Court judge may have dismissed most of the federal charges brought against SolarWinds CISO Tim Brown, but...
A SaaS Identity Christmas Carol | Grip Security – Source: securityboulevard.com
Source: securityboulevard.com – Author: Grip Security Blog Scrooge Corp. was a SaaS breach waiting to happen. Dead accounts, abandoned licenses, forgotten logins—they haunted the halls of...
Professions That Are the Most Exposed to Cybersecurity Threats – Source:hackread.com
Source: hackread.com – Author: Uzair Amir. Explore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how to stay...
The Growing Importance of Secure Crypto Payment Gateways – Source:hackread.com
Source: hackread.com – Author: Waqas. Learn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay safe, avoid theft,...
US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. SUMMARY Sanctions on Chinese Firm: The US sanctioned Sichuan Silence Information Technology and employee Guan Tianfeng for exploiting a firewall...
Authorities Shut Down 27 DDoS-for-Hire Platforms, Arrest 3 Admins – Source:hackread.com
Source: hackread.com – Author: Waqas. SUMMARY Global Dismantling of DDoS Platforms: Law enforcement from 15 countries shut down 27 websites offering DDoS attack services as part...