Category: Mix
Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve…
What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…
By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the…
Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vulnerability type is also…
Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data,…
Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is unique and as…
Today, January 17, 2025, marks a pivotal moment for the EU financial sector as the Digital Operational Resilience Act (DORA)…
In an industry where security needs evolve as rapidly as the threats themselves, standing still isn’t an option. At Intigriti,…
The ideal number of human employees in any company is zero. This is a flaw of capitalism, not automation, yet…
I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given…
HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…
A critical vulnerability (CVE-2025-0282) has been identified in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability could allow…