Category: Mix

Launching new domains view and enhanced policies
12
Jun
2024

Launching new domains view and enhanced policies

We’ve recently announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These…

Vulnerability detected on Veeam Backup Enterprise Manager
10
Jun
2024

Vulnerability detected on Veeam Backup Enterprise Manager

On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM) web interface that enables…

Hackerone logo
07
Jun
2024

Hack My Career: Advice from HackerOne Employees

Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance. Kayla Underkoffler,…

Hackerone logo
06
Jun
2024

NIST CSF 2.0 and Pentesting: What You Need to Know

In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued…

Hackerone logo
06
Jun
2024

HackerOne Company Values Matter: Execute with Excellence

Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on…

Podcast Summary: Dwarkesh vs. Leopold Aschenbrenner
05
Jun
2024

Podcast Summary: Dwarkesh vs. Leopold Aschenbrenner

This is a Fabric conversation extraction (using the extract_wisdom_dm pattern) of the 4-hour conversation between Dwarkesh and Leopold about AGI…

Cybersecurity: Why ROI Isn’t Always a Meaningful Metric
04
Jun
2024

Cybersecurity: Why ROI Isn’t Always a Meaningful Metric

Cybersecurity investments are crucial for businesses of all sizes, but determining the return on investment (ROI) of these investments can…

Analysis of Mics and Mic Sounds Used by Podcasters
04
Jun
2024

Analysis of Mics and Mic Sounds Used by Podcasters

I think I’ve finally figured out what’s up with podcast audio. At least in terms of: So what I’m going…

Hackerone logo
03
Jun
2024

3 Bug Bounty Lessons From Retail & eCommerce Customers

How do security vulnerabilities uniquely impact the retail and eCommerce space, and how can retail and eCommerce organizations use ethical…

Hackerone logo
03
Jun
2024

Top 10 AI Embarrassments to Avoid

Unlike traditional security flaws, which typically result in data breaches or service disruptions, AI systems can also cause embarrassment through…

CVE-2024-24919: Check Point’s Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability
03
Jun
2024

CVE-2024-24919: Check Point’s Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability

Active Exploits target Check Point Security Gateway Zero-Day Information Disclosure flaw Check Point Cybersecurity has issued hotfixes to address a…

The Left's Brexit
31
May
2024

The Left’s Brexit

I think Trump’s conviction might be the American Left’s version of Brexit. First off, I think Trump is the worst…