Category: Mix
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems….
Between 2004 and 2024, passwords topped the list as the most frequently leaked type of data. It’s safe to say…
We all had to start somewhere in bug bounty hunting and we all made mistakes along the way. Most of…
.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…
A group of vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) within OpenPrinting CUPS (the standard open-source printing system present in most…
Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes….
Addressing Inconsistencies in Vulnerability Scanning One of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead…
Bug bounty programs have proven to be an effective strategy for companies looking to proactively enhance their security posture. As…
Rob Samuels | 24 September 2024 at 10:01 UTC AppSec teams face a wide range of challenges when securing their…
Cloudflare R2 buckets are recently becoming more popular as an alternative to AWS S3 buckets for their simplicity, integration support…
The Challenge of Vulnerability Remediation When a vulnerability is identified, teams must determine the best approach to fixing it. This…
Thank You Chicago! Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well,…











