Category: Mix

Hackerone logo
25
Jan
2025

How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify

In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their…

Hackerone logo
25
Jan
2025

New York Releases AI Cybersecurity Guidance: What You Need to Know

AI adoption is accelerating in the financial services industry, both as an asset for improving business operations and as a…

Hackerone logo
25
Jan
2025

Breaking Down the OWASP Top 10: Insecure Design

In the absence of these considerations, systems can be retrofitted with ineffective security controls or lack them entirely. This can…

Hackerone logo
25
Jan
2025

The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolving

Here is HackerOne’s perspective on the Top 10 list for LLM vulnerabilities, how the list has changed, and what solutions…

Hackerone logo
25
Jan
2025

ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments

However, in cybersecurity, quantifying net profit becomes significantly more complex due to the intangible nature of its benefits and the…

Hackerone logo
25
Jan
2025

A Partial Victory for AI Researchers

HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…

Hackerone logo
25
Jan
2025

Introducing Lightspark’s Public Bug Bounty Program

Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve…

Hackerone logo
24
Jan
2025

Resurrecting Shift-Left With Human-in-the-loop AI

What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…

Hackerone logo
24
Jan
2025

Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs

Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…

A Practical Guide to Investigating IoT Devices with the SecurityTrails API
24
Jan
2025

A Practical Guide to Investigating IoT Devices with the SecurityTrails API

The last decade is arguably one of exceptional growth and transformation, with technologies like the Internet of Things (IoT) leading…

Hackerone logo
23
Jan
2025

Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs

Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter
23
Jan
2025

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter

At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a…