Category: Mix

AI-Powered Hacking · Joseph Thacker
04
Jan
2025

AI-Powered Hacking · Joseph Thacker

In most domains, the best AI tools of our day reduce friction and speed up top-tier humans. Agents might take…

AI-Powered Hacking · Joseph Thacker
04
Jan
2025

AI-Powered Hacking · Joseph Thacker

In most domains, the best AI tools of our day reduce friction and speed up top-tier humans. Agents might take…

Hunting for blind XSS vulnerabilities: A complete guide
04
Jan
2025

Hunting for blind XSS vulnerabilities: A complete guide

Cross-site scripting (XSS) vulnerabilities are quite common and fun to find. They also carry great impact when chained with other…

The Top 10 Data Breaches of 2024
24
Dec
2024

The Top 10 Data Breaches of 2024

2024 has been a tumultuous year in cybersecurity with numerous significant data breaches compromising sensitive information and affecting millions globally….

23
Dec
2024

Top Open Source API Security Tools

The modern world relies on Application Programming Interfaces (APIs). They allow applications to communicate with each other, servers, and consumers…

Testing JavaScript files for bug bounty hunters
21
Dec
2024

Testing JavaScript files for bug bounty hunters

You’ve with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities thanks to JavaScript file enumeration,…

The not-so-secret hack to impactful bug bounty programs 
19
Dec
2024

The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Hackerone logo
18
Dec
2024

Breaking Down the OWASP Top 10: Insecure Design

In the absence of these considerations, systems can be retrofitted with ineffective security controls or lack them entirely. This can…

Detectify year in review 2024
18
Dec
2024

Detectify year in review 2024

In 2024, we shipped numerous features to help security teams manage their growing attack surface. Some examples are Domain Connectors…

A complete guide to finding advanced file upload vulnerabilities
18
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…

Hackerone logo
17
Dec
2024

New York Releases AI Cybersecurity Guidance: What You Need to Know

AI adoption is accelerating in the financial services industry, both as an asset for improving business operations and as a…

A complete guide to finding advanced file upload vulnerabilities
14
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…