Sub-Venture Scale Security Problems
Thank you to Kane for coming up with the main thesis and as primary author of this piece. Check out his blog for a lot…
Thank you to Kane for coming up with the main thesis and as primary author of this piece. Check out his blog for a lot…
We’ve recently announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring unprecedented control over…
On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM) web interface that enables an unauthenticated attacker to log…
Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance. Kayla Underkoffler, Senior Security Technologist in Pennsylvania,…
In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued its CyberSecurity Framework (CSF). The CSF…
Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on what this award and HackerOne’s…
This is a Fabric conversation extraction (using the extract_wisdom_dm pattern) of the 4-hour conversation between Dwarkesh and Leopold about AGI and other topics. SUMMARY Leopold…
Cybersecurity investments are crucial for businesses of all sizes, but determining the return on investment (ROI) of these investments can be complex. Conventional ROI methodologies…
I think I’ve finally figured out what’s up with podcast audio. At least in terms of: So what I’m going to do is just blast…
How do security vulnerabilities uniquely impact the retail and eCommerce space, and how can retail and eCommerce organizations use ethical hackers to mitigate risk? We…
Unlike traditional security flaws, which typically result in data breaches or service disruptions, AI systems can also cause embarrassment through errors in judgment, biased decision-making,…
Active Exploits target Check Point Security Gateway Zero-Day Information Disclosure flaw Check Point Cybersecurity has issued hotfixes to address a zero-day vulnerability in its VPNs…