Securing Our Elections Through Vulnerability Testing and Disclosure
Security researchers and election technology manufacturers at the Election Security Research Forum (ESRF). The Event In preparation for the election...
Read more →Security researchers and election technology manufacturers at the Election Security Research Forum (ESRF). The Event In preparation for the election...
Read more →In this blog, we’ll explore who is and should be accountable for AI risk within organizations and how to empower...
Read more →A high-severity security flaw has been disclosed in Meta’s Llama large language model (LLM) framework that, if successfully exploited, could...
Read more →It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still...
Read more →According to HackerOne’s 8th Annual Hacker-Powered Security Report, XSS is the number one most common vulnerability for bug bounty and...
Read more →Cisco warns of a ClamAV bug with PoC exploit Pierluigi Paganini January 26, 2025 Cisco addressed a ClamAV denial-of-service (DoS)...
Read more →HackerOne’s 8th Annual Hacker-Powered Security Report states that information disclosure is the third most common vulnerability reported in bug bounty and...
Read more →HackerOne’s 8th Annual Hacker-Powered Security Report states that improper access control is the second most common vulnerability reported in a bug...
Read more →Since 2018, HackerOne has maintained an employee engagement survey participation rate of over 80%, with half of the surveys achieving...
Read more →What Is a Spot Check? A Spot Check is a powerful tool for security teams to do a tightly focused and...
Read more →Employees had the chance to connect over shared goals and values, fostering stronger relationships beyond the workplace. This event generated...
Read more →