Category: Mix

Hackerone logo
03
Nov
2023

5 Common Mistakes When Running a Bug Bounty Program (and Solutions)

1. Unprepared to Manage Incoming Vulnerability Reports Naturally, the purpose of running a bug bounty program is to identify vulnerabilities…

[tl;dr sec] #206 - Security Engineer Interview Tips, Security Making Eng Faster, GitHub Action Scanner
02
Nov
2023

[tl;dr sec] #206 – Security Engineer Interview Tips, Security Making Eng Faster, GitHub Action Scanner

I hope you’ve been doing well! John Steven is one of the most technically strong people I’ve ever met, and…

Bug Bytes #216 – SQL injections, Android XSS and Writing Quality Reports
02
Nov
2023

Bug Bytes #216 – SQL injections, Android XSS and Writing Quality Reports

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

The Left's Reaction to Israel/Hamas Has Positioned Trump as the Protector of the West
01
Nov
2023

The Left’s Reaction to Israel/Hamas Has Positioned Trump as the Protector of the West

A protester waves a Jihadist flag at a Pro-Palestine protest I think the war in Israel, and the way much…

Hacking HP Display Monitors via Monitor Control Command Set (CVE-2023-5449)
31
Oct
2023

Hacking HP Display Monitors via Monitor Control Command Set (CVE-2023-5449)

Have you ever wondered how display monitor software can change various settings like brightness over a simple display cable? As…

Improvements to the IP page- Blog Detectify
31
Oct
2023

Improvements to the IP page- Blog Detectify

We know how frustrating it can be to discover new assets that don’t follow your internal security policies, such as…

Recently Added Vulnerabilities - September 2023
31
Oct
2023

Recently Added Vulnerabilities – September 2023

Here is a list of all new modules recently added from our community of ethical hackers. You can find a…

Introducing Jobs-to-be-Done - Blog Detectify
31
Oct
2023

Introducing Jobs-to-be-Done – Blog Detectify

As someone working within AppSec or ProdSec security, the scope and responsibilities of your role have likely changed over the…

Resolve exposures and vulnerabilities - Blog Detectify
31
Oct
2023

Resolve exposures and vulnerabilities – Blog Detectify

It’s not unlikely that your team has a sufficient amount of vulnerability data that they must assess, prioritize, and remediate….

Improvements to fingerprinted technologies, IP data, and the attack surface
31
Oct
2023

Improvements to fingerprinted technologies, IP data, and the attack surface

We’ve made several improvements to how users can interact with their fingerprinted technologies data, grouping IP data by several parameters,…

Wallarm at OWASP Global AppSec DC 2023
27
Oct
2023

Wallarm at OWASP Global AppSec DC 2023

If you’re involved in securing APIs, applications and web applications, or looking to learn about these, then the OWASP Global…

Riva Tez vs. David Perell
26
Oct
2023

Riva Tez vs. David Perell

ExWis is a project that Extracts Wisdom from textual content, whether that’s a podcast conversation, an interview, a presentation, an…