Category: Mix

how to find more vulnerabilities using Google search
25
Oct
2024

how to find more vulnerabilities using Google search

Bug bounty hunters who spend time in content discovery and reconnaissance, in general, are always rewarded well for their efforts…

Hackerone logo
25
Oct
2024

Measure, Compare, and Enhance Security Programs with HackerOne Benchmarks

Without clear comparisons and long-term visibility, it’s challenging to identify areas for improvement and make informed, data-driven decisions. That’s why…

Reducing False Positives in API Security: Advanced Techniques Using ML
25
Oct
2024

Reducing False Positives in API Security: Advanced Techniques Using ML

False positives in API security are a serious problem, often resulting in wasted results and time, missing real threats, alert…

The Most Important Sentence
25
Oct
2024

The Most Important Sentence

For anyone struggling career or purpose-wise, I have a diagnostic for you. I believe one of the biggest problems in…

Hackerone logo
24
Oct
2024

OWASP Top 10: The Risk of Cryptographic Failures

What Is Cryptography? Cryptography is the practice and study of techniques for securing communication and information by transforming it into…

Hackerone logo
24
Oct
2024

AWS Security Configuration Review and Best Practices

In fact, the Cloud Security Alliance’s Top Threats to Cloud Computing 2024 Report ranks the following concerns as the top three:…

Hackerone logo
24
Oct
2024

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are…

How Security Edge Revolutionizes API Security
24
Oct
2024

How Security Edge Revolutionizes API Security

Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of traditional Content Delivery Networks (CDNs)….

The complete guide for in-scope entities
21
Oct
2024

The complete guide for in-scope entities

NIS2 will take effect across the EU from 18th October 2024, meaning time is running out to comply with its…

8 essential tools for performing effective reconnaissance
21
Oct
2024

8 essential tools for performing effective reconnaissance

We all know that reconnaissance is important in bug bounty, in fact, it is the most important phase in bug…

12 incident response metrics your business should be tracking
21
Oct
2024

12 incident response metrics your business should be tracking

If there’s a vulnerability in your systems that cybercriminals could exploit, you’ll want to know about it. Collaborating with people…

Automating Dead Link Detection | HAHWUL
20
Oct
2024

Automating Dead Link Detection | HAHWUL

Using Deadfinder and GitHub Actions for Seamless Link Management A dead link, or broken link, occurs when a hyperlink points…