Category: Mix

Hacking misconfigured AWS S3 buckets: A complete guide
06
Sep
2024

Hacking misconfigured AWS S3 buckets: A complete guide

AWS S3 (Simple Storage Service) buckets are a popular storage service used by software companies and organizations to store public…

Hackerone logo
05
Sep
2024

Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings…

Hackerone logo
04
Sep
2024

Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

What is FUD? Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of…

API Attack Surface: How to secure it and why it matters
04
Sep
2024

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple…

Hackerone logo
30
Aug
2024

HackerOne’s Commitment to Learning and Development

HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…

Hackerone logo
30
Aug
2024

How Hai Facilitates Clear and Effective Communication

The Communication Challenge in Cybersecurity The vulnerability management process involves various stakeholders, each with their own expertise and communication styles….

Hackerone logo
30
Aug
2024

Pentesting for iOS Mobile Applications

Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can…

Every AI Talk from DEF CON 2024
28
Aug
2024

Every AI Talk from DEF CON 2024

We will begin with an overview of event analysis systems and their challenges. Participants will learn about different types of…

WordPress GiveWP POP to RCE (CVE-2024-5932)
26
Aug
2024

WordPress GiveWP POP to RCE (CVE-2024-5932)

A few days ago, Wordfence published a blog post about a PHP Object Injection vulnerability affecting the popular WordPress Plugin…

The Real Problem With the Job Market
26
Aug
2024

The Real Problem With the Job Market

Table of Contents The feeling If you’re like me, you’ve had this strange, uneasy feeling about the job market1 for…

What tech leaders do before going on vacation
25
Aug
2024

What tech leaders do before going on vacation

As a technical person who leads a technical team, I know firsthand that it can be easy to get lost…