Category: Mix

Hackerone logo
21
Feb
2024

How Long Does Pentesting Take? [5 Factors of Pentesting Speed]

In evaluating the myriad of security testing methodologies available, we consider them against three pivotal metrics to ascertain their overall…

AI Agents That Hack · Joseph Thacker
21
Feb
2024

AI Agents That Hack · Joseph Thacker

A hackbot is the term I’ve settled on using for AI systems with hacking abilities. I saw the term in…

Security testing for eCommerce websites and retailers 
19
Feb
2024

Security testing for eCommerce websites and retailers 

Security testing for eCommerce websites has become indispensable for online retailers, as it plays a vital role in safeguarding customer…

Creators, Nurturers, Executors, and Gatekeepers
19
Feb
2024

Creators, Nurturers, Executors, and Gatekeepers

We had a great conversation during February’s UL Mid-month Meetup, where we discussed our careers, how vulnerable they were to…

How I Find Positivity in AI's Taking of Jobs
19
Feb
2024

How I Find Positivity in AI’s Taking of Jobs

I know I’m supposed to be happy about all this AI innovation, but all it does is make me sad….

Pkl - Apple’s config lang
17
Feb
2024

Pkl – Apple’s config lang

최근에 Apple이 내부에서 사용하던 Configuration language를 오픈소스로 공개헀습니다. 바로 Pkl(피클)인데요, 과연 Pkl은 JSON과 YAML과 함께 Config의 스타가 될 수 있을까요?…

Hackerone logo
16
Feb
2024

What Is It & How to Remediate

HackerOne’s 7th Annual Hacker Powered Security Report states that improper access control is the second most common vulnerability reported in a…

[tl;dr sec] #218 - Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security
15
Feb
2024

[tl;dr sec] #218 – Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security

❤️‍🔥 tl;dr Love OK this feels a bit awkward to share, but she gave me permission. My friend Tanya Janca…

a guide for security professionals 
13
Feb
2024

a guide for security professionals 

As the implementation date of the Product Security and Telecommunications Infrastructure (PSTI) Act approaches, security professionals must understand and prepare…

Your Work Can Only Be As Good As Your Problems Are Meaningful
12
Feb
2024

Your Work Can Only Be As Good As Your Problems Are Meaningful

Work on the most important problems possible I have a god-tier hack for improving the quality of your work, and…

Slack Increases Bounty Minimums For the Next 90 Days
09
Feb
2024

General Motors Vulnerability Disclosure Program

Just over two years ago, General Motors became the first major automaker to launch a public Vulnerability Disclosure Program (VDP)….

Hackerone logo
08
Feb
2024

How to Use AI Prompting for Security Vulnerabilities [3 Examples]

What Is an AI Prompt? A prompt is an instruction given to an LLM to retrieve desired information to have…