Category: Mix

IDOR: A complete guide to exploiting advanced IDOR vulnerabilities
25
Jun
2024

IDOR: A complete guide to exploiting advanced IDOR vulnerabilities

IDOR —short for insecure direct object reference— vulnerabilities are one of the most commonly found web security vulnerabilities in modern…

Hackerone logo
25
Jun
2024

Sales Development Representatives Win as a Team

In the following interview, Jessica discusses how she embodies HackerOne’s Win as a Team company value to drive her team’s…

My View on The State of US Politics
24
Jun
2024

My View on The State of US Politics

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Hackerone logo
24
Jun
2024

Celebrating International Women in Engineering Day

While there has been progress in increasing the number of women in engineering roles, the representation of women in this field…

CVE-2024-2080: ASUS warns customers
21
Jun
2024

CVE-2024-2080: ASUS warns customers

ASUS announces major Firmware Update ASUS recently issued a firmware update to resolve a critical security vulnerability affecting seven different…

Hackerone logo
20
Jun
2024

Community-driven PTaaS vs. Traditional Pentesting

Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However,…

What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments -
20
Jun
2024

What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments –

On March 31st, 2024, The Payments Card Industry Standards Security Council (PCI SSC) officially retired version 3.2.1 of the PCI…

How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market -
18
Jun
2024

How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market –

Whenever a company is notified about or discovers a critical flaw in their system/application that has the potential to be…

A List of My Hard-won Life Lessons
17
Jun
2024

A List of My Hard-won Life Lessons

I’m working on my context.md file for my personal Digital Assistant, and one part of that will be my model.md…

The Fast-Slow Problem
17
Jun
2024

The Fast-Slow Problem

I’ve been obsessed lately with the concept of slow versus fast. I’m calling it the Fast-Slow Problem. It refers to…

Hackerone logo
14
Jun
2024

HackerOne’s Cloud Security Capabilities for AWS Customers 

HackerOne provides security capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests specific…

Hackerone logo
14
Jun
2024

What HackerOne Customers Can Tell You About Securing Organizational Buy-In for Ethical Hackers

Securing Organizational Buy-in For Ethical Hackers CISOs and other security leaders are challenged to demonstrate the benefits of working with…