[Release] New scan profile overview allows you to see progress over time
Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our users to schedule recurring tests…
Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our users to schedule recurring tests…
Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the Pentagon crowdsourced security program and…
Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method, where a program looks through…
In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great tips from an appsec leader…
Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the name implies, is software that spies…
Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability. It can be demotivating at…
Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video follows this article. OWASP is…
Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the Program Directory to find new…
TL;DR, Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a better idea of just how…
George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing their cloud-native, machine data analytics…
There is a lot think about when it comes to security, but what is the one most important piece of advice a security expert can give?…
Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard, no chats over coffee, no…