Category: Mix

A complete guide to exploiting open URL redirect vulnerabilities
20
Jan
2025

A complete guide to exploiting open URL redirect vulnerabilities

Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vulnerability type is also…

Considerations for Selecting the Best API Authentication Option
20
Jan
2025

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data,…

7 Overlooked recon techniques to find more vulnerabilities
20
Jan
2025

7 Overlooked recon techniques to find more vulnerabilities

Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is unique and as…

DORA compliance | Intigriti
17
Jan
2025

DORA compliance | Intigriti

Today, January 17, 2025, marks a pivotal moment for the EU financial sector as the Digital Operational Resilience Act (DORA)…

Investing in Bug Bounty: Product & Engineering
15
Jan
2025

Investing in Bug Bounty: Product & Engineering

In an industry where security needs evolve as rapidly as the threats themselves, standing still isn’t an option. At Intigriti,…

Founder AI Augmentation
14
Jan
2025

AI is Founder Augmentation | Daniel Miessler

The ideal number of human employees in any company is zero. This is a flaw of capitalism, not automation, yet…

Platform Filters
14
Jan
2025

Reality With Filters | Daniel Miessler

I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given…

Hackerone logo
14
Jan
2025

A Partial Victory for AI Researchers

HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…

Security Update: Ivanti Connect Secure (CVE-2025-0282)
13
Jan
2025

Security Update: Ivanti Connect Secure (CVE-2025-0282)

A critical vulnerability (CVE-2025-0282) has been identified in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability could allow…

Inside the tech that continuously monitors our customers' attack surface
09
Jan
2025

Inside the tech that continuously monitors our customers’ attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…

Triage in bug bounty | Intigriti
09
Jan
2025

Triage in bug bounty | Intigriti

As we step into 2025, many of us are setting resolutions to improve, grow, and achieve more. At Intigriti, we’re…

Hackerone logo
08
Jan
2025

ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments

However, in cybersecurity, quantifying net profit becomes significantly more complex due to the intangible nature of its benefits and the…