Category: Mix

Creators, Nurturers, Executors, and Gatekeepers
19
Feb
2024

Creators, Nurturers, Executors, and Gatekeepers

We had a great conversation during February’s UL Mid-month Meetup, where we discussed our careers, how vulnerable they were to…

How I Find Positivity in AI's Taking of Jobs
19
Feb
2024

How I Find Positivity in AI’s Taking of Jobs

I know I’m supposed to be happy about all this AI innovation, but all it does is make me sad….

Pkl - Apple’s config lang
17
Feb
2024

Pkl – Apple’s config lang

최근에 Apple이 내부에서 사용하던 Configuration language를 오픈소스로 공개헀습니다. 바로 Pkl(피클)인데요, 과연 Pkl은 JSON과 YAML과 함께 Config의 스타가 될 수 있을까요?…

Hackerone logo
16
Feb
2024

What Is It & How to Remediate

HackerOne’s 7th Annual Hacker Powered Security Report states that improper access control is the second most common vulnerability reported in a…

[tl;dr sec] #218 - Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security
15
Feb
2024

[tl;dr sec] #218 – Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security

❤️‍🔥 tl;dr Love OK this feels a bit awkward to share, but she gave me permission. My friend Tanya Janca…

a guide for security professionals 
13
Feb
2024

a guide for security professionals 

As the implementation date of the Product Security and Telecommunications Infrastructure (PSTI) Act approaches, security professionals must understand and prepare…

Your Work Can Only Be As Good As Your Problems Are Meaningful
12
Feb
2024

Your Work Can Only Be As Good As Your Problems Are Meaningful

Work on the most important problems possible I have a god-tier hack for improving the quality of your work, and…

Slack Increases Bounty Minimums For the Next 90 Days
09
Feb
2024

General Motors Vulnerability Disclosure Program

Just over two years ago, General Motors became the first major automaker to launch a public Vulnerability Disclosure Program (VDP)….

Hackerone logo
08
Feb
2024

How to Use AI Prompting for Security Vulnerabilities [3 Examples]

What Is an AI Prompt? A prompt is an instruction given to an LLM to retrieve desired information to have…

How to get the most out of your cybersecurity testing budget 
08
Feb
2024

How to get the most out of your cybersecurity testing budget 

How security professionals can achieve more with less The responsibilities of CISOs and other security professionals are growing more complex. As…

[tl;dr sec] #217 - Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI
08
Feb
2024

[tl;dr sec] #217 – Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI

I hope you’ve been doing well! 📺️ Usable Security at Netflix How do you build security tooling & processes that…

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites
08
Feb
2024

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites

E-commerce stores can lose out on a lot of revenue if price manipulation vulnerabilities get actively exploited by bad actors. …