Category: Mix

HackerOne Responds To The Review of The UK’s Computer Misuse Act (CMA)
20
Apr
2023

HackerOne Responds To The Review of The UK’s Computer Misuse Act (CMA)

By Ilona Cohen, Chief Policy Officer, and Michael Woolslayer, Policy Counsel The U.K. is in the midst of a multi-year…

Fredrik Nordberg Almroth Hack Yourself Stockholm
20
Apr
2023

Survivorship bias, growing attack surface and finding your weakest links

Detectify co-founder and expert bug bounty hunter Fredrik Nordberg Almroth (@almroot) recently spoke at Hack Your Stockholm, our first in-person…

AI Art Hack: Combining Abstract Designs with Objects
20
Apr
2023

AI Art Hack: Combining Abstract Designs with Objects

This is member content. Thank you for being a subscriber. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image: linear-gradient(180deg, #000…

How to set up a fresh Ubuntu desktop using only dotfiles and bash scripts
20
Apr
2023

How to set up a fresh Ubuntu desktop using only dotfiles and bash scripts

Configure settings, install programs, and customize your desktop environment with a single bash command. One of my most favorite things…

Ambassador Spotlight: Adnan Malik | HackerOne
20
Apr
2023

Ambassador Spotlight: Adnan Malik | HackerOne

Who are you? My name is Adnan Malik. I’m a web application security researcher, penetration tester and bug hunter. I…

Detectify scans for actively exploited Log4j vulnerability, CVE-2021-44228
20
Apr
2023

Detectify scans for actively exploited Log4j vulnerability, CVE-2021-44228

Thanks to Detectify Crowdsource hackers, Detectify quickly developed a security test to detect Critical vulnerability CVE-2021-44228 Apache log4j RCE and…

Unsupervised Learning NO. 364 | Reality Headset, BingPT, AI+Cyber
20
Apr
2023

Unsupervised Learning NO. 364 | Reality Headset, BingPT, AI+Cyber

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | January 9, 2023…

How to do twice as much with half the keystrokes using `.bashrc`
20
Apr
2023

How to do twice as much with half the keystrokes using `.bashrc`

An overview of time-saving aliases, functions, and creating a useful Bash prompt. In my recent post about setting up Ubuntu…

Hacker AFK: rez0 | HackerOne
20
Apr
2023

Hacker AFK: rez0 | HackerOne

Today’s Hacker rez0 JXoaT: What was your first experience with hacking growing up?  rez0: I think, at least for the…

How tech managers can make sure security isn’t left off the list this holiday season
20
Apr
2023

How tech managers can make sure security isn’t left off the list this holiday season

The holidays are coming up quickly and while many of us are looking forward to getting some human downtime (not…

Unsupervised Learning NO. 365 | China's Decline, MicrosoftAI, Creativity Ratio…
20
Apr
2023

Unsupervised Learning NO. 365 | China’s Decline, MicrosoftAI, Creativity Ratio…

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 365 |…

19
Apr
2023

SQL injection and XSS: what white hat hackers know about trusting user input

A primer on SQL injection and cross site scripting, and how to handle user input in software development. Software developers…