Category: Mix

Hackerone logo
24
Jan
2025

Resurrecting Shift-Left With Human-in-the-loop AI

What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…

Hackerone logo
24
Jan
2025

Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs

Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…

A Practical Guide to Investigating IoT Devices with the SecurityTrails API
24
Jan
2025

A Practical Guide to Investigating IoT Devices with the SecurityTrails API

The last decade is arguably one of exceptional growth and transformation, with technologies like the Internet of Things (IoT) leading…

Hackerone logo
23
Jan
2025

Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs

Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter
23
Jan
2025

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter

At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a…

Natural vs. Augmented
23
Jan
2025

Fast vs. Slow AI | Daniel Miessler

Augmented vs. Natural Having used hundreds (and built dozens) of AI applications since late 2022, I’ve come to realize something…

Your bug bounty journey, our priority 
22
Jan
2025

Your bug bounty journey, our priority 

The foundation of a successful partnership is a shared commitment to mutual growth – this is something we firmly believe…

Hackerone logo
21
Jan
2025

Introducing Lightspark’s Public Bug Bounty Program

Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve…

Hackerone logo
21
Jan
2025

Resurrecting Shift-Left With Human-in-the-loop AI

What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…

API Security’s Role in Responsible AI Deployment
21
Jan
2025

API Security’s Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the…

A complete guide to exploiting open URL redirect vulnerabilities
20
Jan
2025

A complete guide to exploiting open URL redirect vulnerabilities

Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vulnerability type is also…

Considerations for Selecting the Best API Authentication Option
20
Jan
2025

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data,…