Category: Mix

Frontview Mirror: 2025 Edition
04
Dec
2024

Frontview Mirror: 2025 Edition

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

A complete guide to exploiting advanced authentication vulnerabilities
03
Dec
2024

A complete guide to exploiting advanced authentication vulnerabilities

Authentication vulnerabilities are fun to find as they are impactful by nature and often grant unauthorized users access to various…

Hackerone logo
28
Nov
2024

The Only Solution That Scales With the Cybersecurity Challenge

Cybersecurity is stretched thin. We all know it, so why state it again?  Because cybersecurity is thinner today than yesterday….

Hackerone logo
28
Nov
2024

Why Economic Downturns Put Innovation at Risk And Threaten Cybersafety

The tech sector breathed a sigh of relief when the Federal Reserve confirmed its bail out of Silicon Valley Bank…

Hackerone logo
28
Nov
2024

Make Your Cybersecurity Dollars Last Longer

In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to…

Hackerone logo
28
Nov
2024

Why Retail and E-commerce Organizations Trust Security Researchers During the Holiday Shopping Season

Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to…

Hackerone logo
28
Nov
2024

Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board

CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….

Hackerone logo
27
Nov
2024

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Hackerone logo
27
Nov
2024

Why This Moment In Cybersecurity Needs Hackers To Protect All Software

Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…

A complete guide for beginners
27
Nov
2024

A complete guide for beginners

Bug bounty hunting can seem overwhelming when you’re just starting, especially when you are coming from a non-technical background. And…

Hackerone logo
27
Nov
2024

Network and Information Systems Directive (NIS2) Compliance: What You Need to Know

This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament…

Emerging technologies and their security implications
27
Nov
2024

Emerging technologies and their security implications

As organizations continue adopting emerging technologies, they gain immense benefits but also face new security challenges. Cloud computing, AI, IoT,…