Category: Mix

Hackerone logo
27
Jan
2025

Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in —…

Using ngrok to proxy internal servers in restrictive environments
27
Jan
2025

Using ngrok to proxy internal servers in restrictive environments

When gaining shell access to a machine on a network, a promising attack vector is to check the internal network…

Gaining access to Uber's user data through AMPScript evaluation
27
Jan
2025

Gaining access to Uber’s user data through AMPScript evaluation

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Hackerone logo
26
Jan
2025

European Council Adopts Cyber Resilience Act

The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…

Discovering a zero day and getting code execution on Mozilla's AWS Network
26
Jan
2025

Discovering a zero day and getting code execution on Mozilla’s AWS Network

When Assetnote Continuous Security (CS) monitors your attack surface, one of the things it looks for are instances of WebPageTest….

Hackerone logo
26
Jan
2025

How To Use HackerOne’s Global Vulnerability Policy Map

To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability…

Finding Hidden Files and Folders on IIS using BigQuery
26
Jan
2025

Finding Hidden Files and Folders on IIS using BigQuery

Motivations I recently made a video on how to find hidden files and folders on IIS through the use of…

Hackerone logo
26
Jan
2025

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are…

Hackerone logo
26
Jan
2025

OWASP Top 10: The Risk of Cryptographic Failures

What Is Cryptography? Cryptography is the practice and study of techniques for securing communication and information by transforming it into…

Hackerone logo
26
Jan
2025

AWS Security Configuration Review and Best Practices

In fact, the Cloud Security Alliance’s Top Threats to Cloud Computing 2024 Report ranks the following concerns as the top three:…

Hackerone logo
26
Jan
2025

Measure, Compare, and Enhance Security Programs with HackerOne Benchmarks

Without clear comparisons and long-term visibility, it’s challenging to identify areas for improvement and make informed, data-driven decisions. That’s why…

Hackerone logo
26
Jan
2025

Securing Our Elections Through Vulnerability Testing and Disclosure

Security researchers and election technology manufacturers at the Election Security Research Forum (ESRF). The Event In preparation for the election…