Category: Mix
A good friend of mine and successful bug bounty hunter, Corben Leo, discussed in a blog post how he spotted…
External Attack Surface Management (EASM) is the continuous discovery, analysis, and monitoring of an organization’s public facing assets. A substantial…
There’s often a lack of understanding when it comes to DAST as a methodology versus DAST as a tool. How…
Warning FYI, I’ve had a report from someone else that this technique got their account temporarily locked. After changing their…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | March 13, 2023…
Recon Fundamentals Expanded (Nahamcon 2022 Talk) Source link
Bugcrowd Security Flash – Spring4Shell: What It Is and How To Address It Source link
How to start bug bounty today? Source link
When dealing with JavaScript injection scenarios sometimes we might get into a difficult situation: the target page is not meant…
HackerOne just ran the online h@cktivity con and with it was a CTF. I spent 15 hours solving the big…
A new resource for software development leaders by Victoria Drake. I’m launching a brand new paid newsletter on Substack focused…
NahamCon 2021 – Introduction to Axiom – The Dynamic Infrastructure Framework for Everybody! @pry0cc Source link