New Ways to Use HackerOne
We are on a mission to empower the world’s hackers and security teams to fix software vulnerabilities together. Since HackerOne was founded in 2012, our…
We are on a mission to empower the world’s hackers and security teams to fix software vulnerabilities together. Since HackerOne was founded in 2012, our…
The premium WordPress plugin ‘Gravity Forms,’ currently used by over 930,000 websites, is vulnerable to unauthenticated PHP Object Injection. Gravity Forms is a custom form…
The exposed database contained a staggering 2,808,697 records, amounting to a massive 1 Terabyte in size. On May 29th, 2023, security researcher Jeremiah Fowler made…
By Motti Elloul, VP Customer Success and Incident Response, Email phishing scams are nothing new. But they are growing increasingly prevalent and sophisticated – phishing…
This post by Collin Greene originally appeared on Medium on June 15, 2016. In my first few months at Facebook I found 24 security bugs…
Image: Bing Image Creator Network and email security firm Barracuda today revealed that a recently patched zero-day vulnerability had been exploited for at least seven…
*|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|* *|END:INTERESTED|* *|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|**|ELSE:|* *|END:INTERESTED|* Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how…
The partnership will see Tenet, a blockchain built on the Cosmos SDK, leverage the LayerZero omnichain framework to secure connections with the rest of the…
By Hananel Livneh, Head of Product Marketing, Successful cyberattacks tend to hit companies with the force of an 80-foot wave. The initial damage is quickly…
Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install “undeletable” malware and access the victim’s…
Click here for our main Hack the Pentagon page What Was It Like To Hack the Pentagon? The U.S. Federal Government’s first ever bug bounty…
A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into downloading and launching malicious installers.…