Category: Mix

16
Feb
2025

Functional vs. Technical AGI | Daniel Miessler

I think we should make a distinction between Functional AGI and Technical AGI. Functional AGI is what I use in…

Software vulnerabilities in 2024 | Intigriti
14
Feb
2025

Software vulnerabilities in 2024 | Intigriti

The software industry continues to evolve rapidly, driven by the adoption of cloud services, increasingly complex SaaS ecosystems, and the…

Why it's time for AppSec to embrace AI: How PortSwigger is leading the charge
14
Feb
2025

Why it’s time for AppSec to embrace AI: How PortSwigger is leading the charge

Dafydd Stuttard | 14 February 2025 at 14:23 UTC AI is rapidly gaining traction in virtually every industry. But in…

Overcoming Security Challenges in Real-Time APIs
14
Feb
2025

Overcoming Security Challenges in Real-Time APIs

Speed is everything in the modern business world. Our attention spans are shorter than ever, consumers demand short and seamless…

5 Ways to hack WordPress targets
13
Feb
2025

5 Ways to hack WordPress targets

Over half a billion websites are powered by WordPress as of today. Unfortunately, not every instance deserves the same security…

Bee-yond the Hive: Optimal keyboard shortcuts
12
Feb
2025

Bee-yond the Hive: Optimal keyboard shortcuts

I’m shaking things up and replacing the typical member content with more consumable and actionable insights. This time, I’m pulling…

Hackerone logo
11
Feb
2025

Women@ Kicks Off the Year with a Vision Board Event

For the first meeting of the year, we swapped spreadsheets for inspiration boards. We hosted a Virtual Vision Board Activity—a…

Enhancing OWASP Noir with AI
11
Feb
2025

Enhancing OWASP Noir with AI

Jan 31, 2025 Enhancing Security Testing with AI Integration (LLM) Noir v0.19.0 introduces an exciting feature by integrating AI, specifically…

Embracing the best of both DAST and ASM
11
Feb
2025

Embracing the best of both DAST and ASM

There’s often a lack of understanding when it comes to Dynamic Application Security Testing (DAST) as a methodology versus DAST…

Hackerone logo
10
Feb
2025

Gain Actionable, Data-backed Insights with HackerOne Recommendations

Meet HackerOne Recommendations: a built-in intelligence layer that continuously refines your security program, delivering personalized insights and your program’s historical performance….

How EASM Can Prevent Subdomain Takeover
10
Feb
2025

How EASM Can Prevent Subdomain Takeover

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource…

How we use DAST methodology in EASM
10
Feb
2025

How we use DAST methodology in EASM

There’s often a lack of understanding when it comes to DAST as a methodology versus DAST as a tool. How…