Category: Mix

security.txt adoption in Switzerland - EdOverflow
29
Mar
2023

security.txt adoption in Switzerland – EdOverflow

Recently, @ant0inet (Antoine) tweeted about a cursory scan they did against the .ch TLD to determine how many security.txt files…

Scaling security automation with Docker
29
Mar
2023

Scaling security automation with Docker

What is Docker? Docker is an open-source platform that allows you to develop, deploy, and manage multiple applications across one…

Detectify Blog - Here's how EASM fills gaps missed by AppSec solutions
29
Mar
2023

Detectify Blog – Here’s how EASM fills gaps missed by AppSec solutions

We recently explored why developers have begun to ship more frequently to production, as well the relationship between more frequent…

Post header image
29
Mar
2023

Discovering the IP address of a WordPress site hidden behind Cloudflare

Cloudflare is a company that provides domain name (DNS) services, Distributed Denial of Service (DDoS) protection, and a content delivery…

NO. 375 | 6 Post-GPT Phases, Github's Private Key, New Assistant Interfaces
29
Mar
2023

NO. 375 | 6 Post-GPT Phases, Github’s Private Key, New Assistant Interfaces

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 375 |…

🔴 Live Video Editing: Beginners Bug Bounty, Where to Begin
29
Mar
2023

🔴 Live Video Editing: Beginners Bug Bounty, Where to Begin

🔴 Live Video Editing: Beginners Bug Bounty, Where to Begin Source link

How does the internet work?
29
Mar
2023

How does the internet work?

How does the internet work? Source link

Saving time by automating bug bounty reports
29
Mar
2023

Saving time by automating bug bounty reports

Saving time by automating bug bounty reports Source link

Building in context | victoria.dev
28
Mar
2023

Building in context | victoria.dev

The best laid plans are made better by staying close to context. It’s a comedy classic – you’ve got a…

Essential Bug Bounty Books for Beginners and Pros
28
Mar
2023

Essential Bug Bounty Books for Beginners and Pros

These bug bounty hunting books come recommended by top bug bounty hunters and hackers. Most of them cover web applications,…

Abusing functionality to exploit a super SSRF in Jira Server (CVE-2022-26135) – Assetnote
28
Mar
2023

Abusing functionality to exploit a super SSRF in Jira Server (CVE-2022-26135) – Assetnote

TL;DR Jira is vulnerable to SSRF which requires authentication to exploit. There are multiple ways to create user accounts on…

POSTed JSON with HTTP Client
28
Mar
2023

How to configure Json.NET to create a vulnerable web API

tl;dr No, of course, you don’t want to create a vulnerable JSON API. So when using Json.NET: Don’t use another…