Category: Mix

API Gateways and API Protection: What’s the Difference?
01
Oct
2024

API Gateways and API Protection: What’s the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems….

SSO vs MFA/2FA—and the cost of insecure logins
01
Oct
2024

SSO vs MFA/2FA—and the cost of insecure logins

Between 2004 and 2024, passwords topped the list as the most frequently leaked type of data. It’s safe to say…

7 Tips for bug bounty beginners
01
Oct
2024

7 Tips for bug bounty beginners

We all had to start somewhere in bug bounty hunting and we all made mistakes along the way. Most of…

Policy, SOPs, and AI Are All You Need
29
Sep
2024

Policy, SOPs, and AI Are All You Need

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Security Update: Critical CUPS Vulnerability
27
Sep
2024

Security Update: Critical CUPS Vulnerability

A group of vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) within OpenPrinting CUPS (the standard open-source printing system present in most…

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810
26
Sep
2024

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes….

Hackerone logo
26
Sep
2024

How to Streamline Your SDLC With Hai

Addressing Inconsistencies in Vulnerability Scanning One of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead…

What is a bug bounty program? A guide for businesses
25
Sep
2024

What is a bug bounty program? A guide for businesses

Bug bounty programs have proven to be an effective strategy for companies looking to proactively enhance their security posture. As…

API Security: The 6 biggest challenges AppSec teams face, and how to solve them. | Blog
24
Sep
2024

API Security: The 6 biggest challenges AppSec teams face, and how to solve them. | Blog

Rob Samuels | 24 September 2024 at 10:01 UTC AppSec teams face a wide range of challenges when securing their…

Hacking misconfigured Cloudflare R2 buckets: a complete guide
22
Sep
2024

Hacking misconfigured Cloudflare R2 buckets: a complete guide

Cloudflare R2 buckets are recently becoming more popular as an alternative to AWS S3 buckets for their simplicity, integration support…

Hackerone logo
20
Sep
2024

How to Accelerate Vulnerability Remediation with Hai

The Challenge of Vulnerability Remediation When a vulnerability is identified, teams must determine the best approach to fixing it. This…

Chicago API Security Summit 2024
20
Sep
2024

Chicago API Security Summit 2024

Thank You Chicago! Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well,…