Category: Mix
In today’s digital landscape, ensuring the security of web applications and APIs is paramount. The journey to find the right…
Since its inception, Yahoo’s Bug Bounty program has received thousands of vulnerability reports from over 6,000 hackers worldwide. And today,…
The following is the output of extwis on a piece of content. extwis is an AI tool I built for…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
How and why I moved rez0.blog to josephthacker.com The story of josephthacker.com Back in college, I bought the domain josephthacker.com…
In an era where APIs (Application Programming Interfaces) are the lifeblood of digital interactions, the need for robust API security…
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a…
Gareth Heyes | 25 September 2023 at 14:00 UTC What is DOM Invader? DOM Invader is a browser extension that…
Over the past few weeks, I’ve been exploring the capabilities of ChatGPT on both GPT-3.5 and GPT-4. They’re incredibly powerful…
I recently participated as a panelist on a HackerOne press panel where there was a lot of discussion about AI…
I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…
The saying “You’re the average of the five people spend the most time with” is still true, but has been…











