Category: Mix

Testing JavaScript files for bug bounty hunters
21
Dec
2024

Testing JavaScript files for bug bounty hunters

You’ve with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities thanks to JavaScript file enumeration,…

The not-so-secret hack to impactful bug bounty programs 
19
Dec
2024

The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Hackerone logo
18
Dec
2024

Breaking Down the OWASP Top 10: Insecure Design

In the absence of these considerations, systems can be retrofitted with ineffective security controls or lack them entirely. This can…

Detectify year in review 2024
18
Dec
2024

Detectify year in review 2024

In 2024, we shipped numerous features to help security teams manage their growing attack surface. Some examples are Domain Connectors…

A complete guide to finding advanced file upload vulnerabilities
18
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…

Hackerone logo
17
Dec
2024

New York Releases AI Cybersecurity Guidance: What You Need to Know

AI adoption is accelerating in the financial services industry, both as an asset for improving business operations and as a…

A complete guide to finding advanced file upload vulnerabilities
14
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…

Hackerone logo
14
Dec
2024

How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs

There are three factors that differentiate crypto and blockchain organizations from other industries; their attack surfaces, their most common vulnerabilities,…

Hackerone logo
14
Dec
2024

How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify

In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their…

The key to ensuring software quality and reliability
13
Dec
2024

The key to ensuring software quality and reliability

Regression testing is a crucial part of software development that ensures new code changes don’t negatively affect existing functionality. It…

Hackerone logo
12
Dec
2024

Hack My Career: Saskia Braucher

When Saskia joined the tech world, she didn’t follow the conventional path of computer science degrees or coding boot camps….

Hackerone logo
11
Dec
2024

Six Years of Proactive Defense: Deribit’s Journey with HackerOne

Q: Why did Deribit launch a bug bounty program? A: I like to view security as an onion where each…