Category: Mix

Hackerone logo
28
Feb
2024

Snap’s Safety Efforts With AI Red Teaming From HackerOne

Explaining The Difference Between Red Teaming For AI Safety and AI Security AI red teaming for safety issues focuses on…

Hackerone logo
28
Feb
2024

The AI Assistant for Vulnerability Intelligence [4 Use Cases]

This week, we have officially launched the beta version of our GenAI co-pilot, Hai. Hai introduces GenAI capabilities into the…

Improving Security with Wallarm's NIST CSF 2.0 Dashboard
26
Feb
2024

Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated,…

Pentesting in financial services: adapting to changing threats
26
Feb
2024

Pentesting in financial services: adapting to changing threats

Cybercriminals frequently target the financial services sector due to the abundance of confidential client information it carries. These attacks can…

Framing is Everything
25
Feb
2024

Framing is Everything

I’m starting to think Framing is everything. FramingThe process by which individuals construct and interpret their reality—concsiously or unconsciously—through specific…

Hackerone logo
23
Feb
2024

The Risk of AI Voice Cloning [Q&A With an AI Hacker]

Q: What Is AI Voice Cloning? A: AI is voice cloning technology that allows anyone to take a little bit…

Improving domain discovery with new connectors
23
Feb
2024

Improving domain discovery with new connectors

Our new domain connector simplifies and expands support for organizations integrating cloud providers to Detectify. Security teams can now have…

Exploiting a Blind SQL Injection via XSS – RCE Security
23
Feb
2024

Exploiting a Blind SQL Injection via XSS – RCE Security

Introduction You probably have read about my recent swamp of CVEs affecting a WordPress plugin called Transposh Translation Filter, which…

Analyzing Threat Reports with Fabric
21
Feb
2024

Analyzing Threat Reports with Fabric

We’ve just added a new Pattern to fabric. It’s called analyze_threat_report, and it’s designed to extract all the most valuable…

Hackerone logo
21
Feb
2024

How Long Does Pentesting Take? [5 Factors of Pentesting Speed]

In evaluating the myriad of security testing methodologies available, we consider them against three pivotal metrics to ascertain their overall…

AI Agents That Hack · Joseph Thacker
21
Feb
2024

AI Agents That Hack · Joseph Thacker

A hackbot is the term I’ve settled on using for AI systems with hacking abilities. I saw the term in…

Security testing for eCommerce websites and retailers 
19
Feb
2024

Security testing for eCommerce websites and retailers 

Security testing for eCommerce websites has become indispensable for online retailers, as it plays a vital role in safeguarding customer…