Introducing Lightspark’s Public Bug Bounty Program
Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve...
Read more →Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve...
Read more →What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify...
Read more →By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the...
Read more →Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vulnerability type is also...
Read more →Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data,...
Read more →Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is unique and as...
Read more →Today, January 17, 2025, marks a pivotal moment for the EU financial sector as the Digital Operational Resilience Act (DORA)...
Read more →In an industry where security needs evolve as rapidly as the threats themselves, standing still isn’t an option. At Intigriti,...
Read more →The ideal number of human employees in any company is zero. This is a flaw of capitalism, not automation, yet...
Read more →I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given...
Read more →HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne...
Read more →A critical vulnerability (CVE-2025-0282) has been identified in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability could allow...
Read more →