how I bruteforced my way into your Active Directory – honoki
Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE....
Read more →Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE....
Read more →An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I...
Read more →If you’re a Burp Suite user, you’ll be familiar with Burp Collaborator: a service that allows you to monitor out-of-band...
Read more →Axel Springer has long been a pioneer in the digital publishing industry, with a vast portfolio of brands, such as...
Read more →The Wallarm API Discovery module has been further enhanced to enable customers to identify Orphan APIs and bring them under...
Read more →My whole career has been in Information Security, and I began thinking a lot about AI in 2015. Since then...
Read more →Welcome to the 5th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a...
Read more →We recently hosted a compact and very engaging panel discussion about the new SEC Cyber Incident Reporting Rules due to...
Read more →Explaining the benefits of hyping up your friends’ ideas. Amplify (ˈam·pləˌfī) verb: To make larger, greater, or stronger; enlarge; extend....
Read more →Over the course of a few weeks, we had conversations with 50+ CISOs and security leaders from a wide range...
Read more →I hope you’ve been doing well! Hacker Summer Camp This year was my first time in Vegas since the pandemic,...
Read more →Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a...
Read more →