Category: Mix

Hackerone logo
21
Mar
2024

AI Safety vs. AI Security [2 Types of AI Red Teaming]

What Is the Difference Between Red Teaming For AI Safety and AI Security? AI red teaming is a form of…

Hackerone logo
21
Mar
2024

Decoding the Characteristics of Modern Pentesting: Effectiveness

Quality/Effectiveness: Effectiveness measures the method’s ability to provide reliable and accurate vulnerability detections, comprehensive system coverage, compliance with standards, and…

Hackerone logo
21
Mar
2024

Reversing The Trend: Support and Mediation Win as a Team

It was a daunting task, especially considering the target was hovering around 52% at the time. But as the team…

Meet the hacker: HG_Real - Intigriti
20
Mar
2024

Meet the hacker: HG_Real – Intigriti

In cybersecurity, ethical hackers are like digital guardians, keeping our online world safe. Game hacking adds a twist to this,…

Announcing Intigriti's Brinqa Integration  - Intigriti
20
Mar
2024

Announcing Intigriti’s Brinqa Integration  – Intigriti

We’re happy to announce Intigriti’s latest partnership with Brinqa, a leader in vulnerability management. This integration marks a significant step…

NIS2 Directive, CER, and DORA compliance challenges
20
Mar
2024

NIS2 Directive, CER, and DORA compliance challenges

**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are…

View vulnerabilities on Attack Surface page
20
Mar
2024

Significant changes to attack surface overview and many new tests

The new attack surface overview puts the changes and potential risky exposures to your attack surface front and center. But…

The AI Coin-sorter Analogy
19
Mar
2024

The AI Coin-sorter Analogy

I’ve had this analogy in my mind for a while for AI. Specifically, neural nets. Imagine a coin sorter with…

Top 5 Data Breaches That Cost Millions
18
Mar
2024

Top 5 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using…

Aggressive scanning in bug bounty (and how to avoid it)
18
Mar
2024

Aggressive scanning in bug bounty (and how to avoid it)

Presented by CryptoCat What is aggressive scanning? In bug bounty, researchers are expected to configure automated tools and scanners to…

SaaS businesses need to rethink their penetration testing approach
18
Mar
2024

SaaS businesses need to rethink their penetration testing approach

Every year, companies increasingly rely on software-as-a-service platforms (SaaS) to handle a variety of tasks, such as website analysis, accounting,…

Breaking Down the Benefits of Hacker-Powered Pen Tests
16
Mar
2024

Bug Bounty – How To Earn A Living

If you ever dreamed of becoming a bounty hunter, your dreams can come true — without changing your name to…