Source: www.bitdefender.com – Author: Graham Cluley The Taliban government of Afghanistan is reeling after unidentified hackers successfully carried out a massive cyber attack against its computer...
Day: February 9, 2025
Huawei revenue growing fast, suggesting China’s scoffing at sanctions – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Asia In Brief Huawei chair Liang Hua last week told a conference in China that the company expects to meet...
How to Root Out Malicious Employees – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access...
Cyber Security in Customer Engagement: The Triple Defence Strategy – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As digital interactions dominate modern communication, the rapid evolution of cyber threats demands robust security measures in customer engagement as...
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game – Source:www.mcafee.com
Source: www.mcafee.com – Author: McAfee. Cybercriminals will always try to cash in on a good thing, and football is no exception. Online scammers are ramping up...
Hacker-Powered Data – Security Weaknesses and Embracing Risk with HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to...
Don’t Believe These 4 Bug Bounty Myths – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat down...
Black Hat 2019: Highlights from the Biggest and Best Yet – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions, innovative...
The Security Vendors Startups like Lob Can’t Live Without – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Source: https://twitter.com/arkadiyt/status/1144842849135079424 We love hearing that customers can’t live without us. Who doesn’t? It’s especially gratifying coming from a repeat customer like...
GraphQL Week on The Hacker101 Capture the Flag Challenges – Source:www.hackerone.com
Source: www.hackerone.com – Author: Cody Brocious. What do Netflix, Intuit, Facebook, PayPal, and HackerOne all have in common? All these companies, and many others, have adopted...
Live Hacking Events: Stats, invitations, and what’s next – Source:www.hackerone.com
Source: www.hackerone.com – Author: luke. Our tagline, “Together We Hit Harder” is born of the belief that when hackers and security teams are connected, security improves....
London Called, Hackers Answered: Recapping h1-4420 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. On an unseasonably sunny summer day, hackers from around the world descended on London, England, not to see an unobstructed view...
Breaking Down the Benefits of Hacker-Powered Pen Tests – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Forrester Consulting recently published “The Total Economic Impact Of HackerOne Challenge: Improved Security And Compliance”. This blog takes a look at...
Improving Your Workflows and Analysis with Custom Fields – Source:www.hackerone.com
Source: www.hackerone.com – Author: Martijn Russchen. Today, HackerOne is thrilled to release Custom Fields, the latest way to sharpen security workflows and software development cycles. Custom...
Cloud Security Alliance Webinar Recap: Avoid the Breach with Shopify’s Andrew Dunbar – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. In this Cloud Security Alliance (CSA) fireside chat, Shopify’s VP of Security Engineering and IT sat down with HackerOne’s Luke Tucker...
PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated) – Source:hackread.com
Source: hackread.com – Author: Waqas. PlayStation Network Down: PSN is experiencing a major outage, affecting account login, online gaming, PlayStation Store, and more. No fixed ETA...
Weekly Update 438 – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt I think what’s really scratching an itch for me with the home theatre thing is that it’s this whole geeky...
Through a Hacker’s Eyes: Recapping h1-604 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a...
Tell Your Hacker Story with the Redesigned Profile Pages – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. We are excited to announce new hacker profile pages on HackerOne! This redesign gives your profile a fresh new look and...
3 Ways Hacker-Powered Security Helps the Agile CISO – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Security teams are challenged by the radical shifts in software development, from the fast pace and frequent releases to new languages...
Breaking Down the Benefits of Hacker-Powered Pentests – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. To produce their recent report “The Total Economic Impact Of HackerOne Challenge: Improved Security And Compliance”, Forrester Consulting interviewed customers that...
PayPal Celebrates Its First Anniversary on HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. This blog post was written and contributed by Ray Duran on behalf of the PayPal Bug Bounty team. PayPal transitioned its...
GitLab: Reducing the time to payout and a bug bounty anniversary contest – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. This guest post is contributed by Dennis Appelt at GitLab and was originally published here. In just nine months since going public...
Announcing the Security@ San Francisco 2019 Agenda – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. The agenda for the third annual hacker-powered security conference, Security@ San Francisco, is live! Security@ is the only conference dedicated to...
How Companies Like Facebook Find the Bugs that Matter – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Bug bounty programs are instrumental in categorizing bugs, triaging, prioritizing, and shutting down vulnerabilities before they blow up. Tech companies large...
Hacking with Valor: Why We Raised $36.4M with Valor Equity Partners – Source:www.hackerone.com
Source: www.hackerone.com – Author: Marten Mickos. Our civilization is going digital. That’s fantastic. Unfortunately our software is not secure enough to carry a digital and connected...
Upserve Resolves Over 85 Bugs in Two Years Thanks to Hackers – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. It’s been two years since Upserve launched its public bug bounty program on HackerOne. During that time, Upserve’s security team has...
Bringing the Heat to Vegas: Recapping record-breaking h1-702 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Prior to attending Hacker Summer Camp, there were whispers (or roars) of the infestation of grasshoppers in Las Vegas, Nevada. Local...
HackerOne Praised By An Original Hacker – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. A hacker is “one who enjoys the intellectual challenge of creatively overcoming limitations.” No one exemplifies that definition like Steve Gibson,...
LevelBlue Earns Prestigious MSS Award from Frost & Sullivan – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. LevelBlue has proudly earned Frost & Sullivan’s 2024 Best Practices Competitive Strategy Leadership Award in the Americas Managed Security Services (MSS)...