Category: Mix

Hackerone logo
27
Mar
2024

New VDP Guidance UK Smart Products [3 Requirements]

New security regulations for connected devices and related guidance enter into force in the United Kingdom at the end of April. The…

Spoutible Enhances Platform Security through Partnership with Wallarm
26
Mar
2024

Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community,…

Efficient Security Principle (ESP)
25
Mar
2024

Efficient Security Principle (ESP)

One of the hardest things about being in information security is the frustration. The longer you’re in the field the…

Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks
25
Mar
2024

Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks

All industries are at risk of credential stuffing and account takeover (ATO) attacks. However, some industries are at a greater…

Hackerone logo
25
Mar
2024

What Is an Information Disclosure Vulnerability? [Examples]

HackerOne’s 7th Annual Hacker-Powered Security Report states that information disclosure is the third most common vulnerability reported in both bug bounty…

Revolutionizing healthcare security: moving beyond pentesting 
25
Mar
2024

Revolutionizing healthcare security: moving beyond pentesting 

The healthcare sector remains a prime target for cybercriminals, with 90% of healthcare institutions experiencing at least one security breach in…

Keep Hackers Out of Your Kubernetes Cluster with These 5 Simple Tricks!
22
Mar
2024

Keep Hackers Out of Your Kubernetes Cluster with These 5 Simple Tricks!

Securing Kubernetes clusters may feel overwhelming, as it’s often challenging to prioritize security investments and focus on what matters. In…

Two different IDOR bugs at mijn.VvAA.nl lead to potential access to data of 130k healthcare providers; including their own cyber risk insurance policy documents and more. | by Jonathan Bouman | Mar, 2024
22
Mar
2024

Two different IDOR bugs at mijn.VvAA.nl lead to potential access to data of 130k healthcare providers; including their own cyber risk insurance policy documents and more. | by Jonathan Bouman | Mar, 2024

Today we are going to have a close look at the VvAA, it’s one of the biggest insurance and consulting…

Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients | by Jonathan Bouman | Mar, 2024
21
Mar
2024

Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients | by Jonathan Bouman | Mar, 2024

Ransomware attacks in healthcare are our biggest threat according to the annual report of Z-Cert.nl. In this report it’s mentioned…

Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers | by Jonathan Bouman | Mar, 2024
21
Mar
2024

Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers | by Jonathan Bouman | Mar, 2024

Ransomware attacks in healthcare are our biggest threat according to the annual report of Z-Cert.nl. In this report it’s mentioned…

Pkl - Apple’s config lang
21
Mar
2024

Smuggling with JSON | HAHWUL

JSON은 YAML과 함께 자주 사용되는 포맷 중 하나입니다. K:V 형태의 단순한 구성이지만, JSON의 특성을 이용하면 데이터를 숨기고 Application의 잘못된 동작을…

Hackerone logo
21
Mar
2024

AI Safety vs. AI Security [2 Types of AI Red Teaming]

What Is the Difference Between Red Teaming For AI Safety and AI Security? AI red teaming is a form of…