Category: Mix

Hackerone logo
14
Jan
2025

A Partial Victory for AI Researchers

HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…

Security Update: Ivanti Connect Secure (CVE-2025-0282)
13
Jan
2025

Security Update: Ivanti Connect Secure (CVE-2025-0282)

A critical vulnerability (CVE-2025-0282) has been identified in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability could allow…

Inside the tech that continuously monitors our customers' attack surface
09
Jan
2025

Inside the tech that continuously monitors our customers’ attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…

Triage in bug bounty | Intigriti
09
Jan
2025

Triage in bug bounty | Intigriti

As we step into 2025, many of us are setting resolutions to improve, grow, and achieve more. At Intigriti, we’re…

Hackerone logo
08
Jan
2025

ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments

However, in cybersecurity, quantifying net profit becomes significantly more complex due to the intangible nature of its benefits and the…

Effective API Throttling for Enhanced API Security
08
Jan
2025

Effective API Throttling for Enhanced API Security

APIs are the backbone of modern digital ecosystems, but their misuse can expose systems to cyber threats. Effective API throttling…

Hackerone logo
06
Jan
2025

The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolving

Here is HackerOne’s perspective on the Top 10 list for LLM vulnerabilities, how the list has changed, and what solutions…

AI-Powered Hacking · Joseph Thacker
04
Jan
2025

AI-Powered Hacking · Joseph Thacker

In most domains, the best AI tools of our day reduce friction and speed up top-tier humans. Agents might take…

AI-Powered Hacking · Joseph Thacker
04
Jan
2025

AI-Powered Hacking · Joseph Thacker

In most domains, the best AI tools of our day reduce friction and speed up top-tier humans. Agents might take…

Hunting for blind XSS vulnerabilities: A complete guide
04
Jan
2025

Hunting for blind XSS vulnerabilities: A complete guide

Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great impact when chained with other…

The Top 10 Data Breaches of 2024
24
Dec
2024

The Top 10 Data Breaches of 2024

2024 has been a tumultuous year in cybersecurity with numerous significant data breaches compromising sensitive information and affecting millions globally….

23
Dec
2024

Top Open Source API Security Tools

The modern world relies on Application Programming Interfaces (APIs). They allow applications to communicate with each other, servers, and consumers…