Category: Mix

An intelligent way to look for vulnerabilities
24
May
2023

Malicious Data Mining @ HyperIsland

Johan Edholm and I (Fredrik Nordberg Almroth) had a talk a while back at HyperIsland, Stockholm (the 18’th of October) for the DDS13 group….

Bug Bytes #201 – Path Traversal, Prompt Injection, and GitHub Actions
24
May
2023

Bug Bytes #201 – Path Traversal, Prompt Injection, and GitHub Actions

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

H1-415 Recap: Oath Pays Over $400,000 to Hackers in One Day
24
May
2023

Alex Rice and Zane Lackey Discuss Modern Security for Practitioners

Our co-founder and CTO, Alex Rice, was a recent guest on The Modern Security Series by Signal Sciences, along with…

How I hacked Facebook and received a $3,500 USD Bug Bounty
24
May
2023

How I hacked Facebook and received a $3,500 USD Bug Bounty

Find out how our Security Researcher Frans Rosén hacked Facebook and found a stored XSS for which he received a bug…

There is no room for racism or inequality here.
24
May
2023

Samy Kamkar’s Security@ San Francisco Keynote

If you were into social networks during the MySpace era, you might recall the Samy Worm of 2005. The worm…

New vulnerability findings: Joomla, JBoss, Jenkins and others!
24
May
2023

Server-side Javascript Injections and more!

Today’s updates fill the needs of many of you out there! You asked for it, and now it’s in the…

Juneteenth: HackerOne’s Day for Action
24
May
2023

Hacking The Planet – Hack The World 2017 Recap

After 1 month of our community’s best and brightest going head to head to be named Hack The World 2017…

An intelligent way to look for vulnerabilities
24
May
2023

Detectify Responsible Disclosure Program – Detectify Blog

As of today, researchers can report security issues in Detectify services to earn a spot on our Hall of Fame…

h1-415 CTF Winners Announced! | HackerOne
24
May
2023

Bringing Private-sector Security into the U.S. Government [Security@ Recaps]

“Hacking the U.S. Government” was the first panel discussion at Security@ SF, and it proved to be as interesting as…

How we got read access on Google’s production servers
24
May
2023

How we got read access on Google’s production servers

Few things are better than a good ethical hacking challenge and what could be more fun than finding a target…

What percentage of your software vulnerabilities have GDPR implications?
23
May
2023

What percentage of your software vulnerabilities have GDPR implications?

GDPR is a regulation requiring organizations to protect the personal data and privacy of EU citizens for transactions that occur…

An intelligent way to look for vulnerabilities
23
May
2023

Security testing behind login – Detectify Blog

A comprehensive security evaluation of any web application needs to be able to test areas behind a login. Find out…