Category: Mix

Automate Your iPhone's Volume Control
07
Oct
2024

Automate Your iPhone’s Volume Control

Today, I’m going to share a quick automation trick that will save your eardrums and maybe even your sanity. The…

The power of cyber threat analysis 
05
Oct
2024

The power of cyber threat analysis 

Cybersecurity is not just an IT concern, but a business imperative. Cyber threats pose significant financial, reputational, and legal risks….

All in on flexible and efficient integrations
04
Oct
2024

All in on flexible and efficient integrations

Our users secure products and services developed by dozens of distributed technical teams. They rely on tools like Detectify to…

Who's building it? · Joseph Thacker
03
Oct
2024

Who’s building it? · Joseph Thacker

Andrej Karpathy recently tweeted this: “Input optional product Don’t ask your users for input. Coming up with input is hard,…

Hackerone logo
01
Oct
2024

NIS2: Next Step Forward on EU Security Requirements

NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security…

Hackerone logo
01
Oct
2024

How To Find Broken Access Control Vulnerabilities in the Wild

What Is Broken Access Control? BAC is a class of application vulnerability where a function or asset in the application…

API Gateways and API Protection: What’s the Difference?
01
Oct
2024

API Gateways and API Protection: What’s the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems….

SSO vs MFA/2FA—and the cost of insecure logins
01
Oct
2024

SSO vs MFA/2FA—and the cost of insecure logins

Between 2004 and 2024, passwords topped the list as the most frequently leaked type of data. It’s safe to say…

7 Tips for bug bounty beginners
01
Oct
2024

7 Tips for bug bounty beginners

We all had to start somewhere in bug bounty hunting and we all made mistakes along the way. Most of…

Policy, SOPs, and AI Are All You Need
29
Sep
2024

Policy, SOPs, and AI Are All You Need

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Security Update: Critical CUPS Vulnerability
27
Sep
2024

Security Update: Critical CUPS Vulnerability

A group of vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) within OpenPrinting CUPS (the standard open-source printing system present in most…

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810
26
Sep
2024

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes….