Revolutionizing Investigations: The Impact of AI in Digital Forensics
Artificial intelligence (AI) is making waves in many industries across the board. It found use in healthcare, manufacturing, retail, finance, and other sectors that deal…
Artificial intelligence (AI) is making waves in many industries across the board. It found use in healthcare, manufacturing, retail, finance, and other sectors that deal…
Security researchers and election technology manufacturers at the Election Security Research Forum (ESRF). The Event In preparation for the election season, HackerOne planned and executed…
In this blog, we’ll explore who is and should be accountable for AI risk within organizations and how to empower them to take this significant…
A high-severity security flaw has been disclosed in Meta’s Llama large language model (LLM) framework that, if successfully exploited, could allow an attacker to execute…
It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized access, bypassing rate limits, or…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still open to attackDespite last week’s…
According to HackerOne’s 8th Annual Hacker-Powered Security Report, XSS is the number one most common vulnerability for bug bounty and number two for pentesting. Combining…
Cisco warns of a ClamAV bug with PoC exploit Pierluigi Paganini January 26, 2025 Cisco addressed a ClamAV denial-of-service (DoS) vulnerability, and experts warn of…
HackerOne’s 8th Annual Hacker-Powered Security Report states that information disclosure is the third most common vulnerability reported in bug bounty and the fourth most common for…
HackerOne’s 8th Annual Hacker-Powered Security Report states that improper access control is the second most common vulnerability reported in a bug bounty and number three reported…
Since 2018, HackerOne has maintained an employee engagement survey participation rate of over 80%, with half of the surveys achieving 90% or more participation. The…
What Is a Spot Check? A Spot Check is a powerful tool for security teams to do a tightly focused and scoped human-powered assessment with security…