Category: Mix

A hackers’ guide to online voting systems
05
Mar
2024

A hackers’ guide to online voting systems

In today’s digital world, online voting systems are pivotal in various domains. Businesses rely on them for award shows where…

To Survive AI, We Must Become Creators
04
Mar
2024

To Survive AI, We Must Become Creators

There’s a lot uncertainty in the knowledge worker job market right now, largely because of AI. I have a simple…

Introducing Message Templates - Intigriti
01
Mar
2024

Introducing Message Templates – Intigriti

In case you missed it, we recently introduced message templates! In our ongoing effort to improve your experience and productivity,…

Hackerone logo
28
Feb
2024

Snap’s Safety Efforts With AI Red Teaming From HackerOne

Explaining The Difference Between Red Teaming For AI Safety and AI Security AI red teaming for safety issues focuses on…

Hackerone logo
28
Feb
2024

The AI Assistant for Vulnerability Intelligence [4 Use Cases]

This week, we have officially launched the beta version of our GenAI co-pilot, Hai. Hai introduces GenAI capabilities into the…

Improving Security with Wallarm's NIST CSF 2.0 Dashboard
26
Feb
2024

Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated,…

Pentesting in financial services: adapting to changing threats
26
Feb
2024

Pentesting in financial services: adapting to changing threats

Cybercriminals frequently target the financial services sector due to the abundance of confidential client information it carries. These attacks can…

Framing is Everything
25
Feb
2024

Framing is Everything

I’m starting to think Framing is everything. FramingThe process by which individuals construct and interpret their reality—concsiously or unconsciously—through specific…

Hackerone logo
23
Feb
2024

The Risk of AI Voice Cloning [Q&A With an AI Hacker]

Q: What Is AI Voice Cloning? A: AI is voice cloning technology that allows anyone to take a little bit…

Improving domain discovery with new connectors
23
Feb
2024

Improving domain discovery with new connectors

Our new domain connector simplifies and expands support for organizations integrating cloud providers to Detectify. Security teams can now have…

Exploiting a Blind SQL Injection via XSS – RCE Security
23
Feb
2024

Exploiting a Blind SQL Injection via XSS – RCE Security

Introduction You probably have read about my recent swamp of CVEs affecting a WordPress plugin called Transposh Translation Filter, which…

Analyzing Threat Reports with Fabric
21
Feb
2024

Analyzing Threat Reports with Fabric

We’ve just added a new Pattern to fabric. It’s called analyze_threat_report, and it’s designed to extract all the most valuable…