Hacker-Powered Security Report 2018, 188 Facts
Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since...
Read more →Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since...
Read more →We love talking about security and we believe that security knowledge should be easily accessible and fun. This is why...
Read more →So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one...
Read more →The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software....
Read more →Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations of all shapes and sizes...
Read more →Update: Broken Authentication has moved down the list to position #7 because it seems to be less of an issue...
Read more →In August 2016, a small group of HackerOne staff brought to life the first ever live hacking event in HackerOne’s...
Read more →We will have scheduled Demo sessions this week and we definitely think that you should join. In the 30 minute...
Read more →September 4, 2018 – Eighteen month transitional period ends. Covered Entities are required to be in compliance with the requirements...
Read more →Update: On the OWASP Top 10 2021 proposed, Cross-site scripting (XSS) was moved from the top of the OWASP list...
Read more →I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break...
Read more →Hacker101 is getting something brand new: our own Capture The Flag! For those who are unfamiliar, Capture The Flags (better...
Read more →