Using Bug Bounty Talent Pools to Attract and Maintain Top Talent
Security leaders today face a complex set of talent challenges—from training on the latest attack vectors, to finding talent with the right skills, to preventing…
Security leaders today face a complex set of talent challenges—from training on the latest attack vectors, to finding talent with the right skills, to preventing…
We checked 30,000 Magento stores for three publicly available vulnerabilities that are sometimes found in older Magento installations. Despite the most recent of the three…
It’s that time of the year again. Time to dig out your wrinkled “No, I can’t fix your computer” t-shirt from the bottom of the…
Have you ever wondered how a hacker would analyze and attack a Magento website? We picked the brains of two ethical hackers to find out.…
We start the new year of 2020 with great prospects. First of all, 2019 turned out to be a massive success for hacker-powered security. HackerOne…
Office IT-Partner is a Swedish IT consultancy providing a range of tailored solutions to clients across the country. Fredrik Alexandersson, Systems architect and Senior security advisor,…
The Kubernetes bug bounty program was announced today, after months of running in a ‘beta’ mode with invite-only researchers. The goal of the program is…
A security flaw in the WPA2 protocol was found and published by Belgian researchers on the morning of October 16th 2017. The protocol – normally…
Not every bug bounty program is built the same. Today, GitLab announced that they have surpassed the milestone of awarding out $1 million in bug…
With over 1200 hits generated by Crowdsource submissions, September was our second best month so far. We have added many new vulnerabilities affecting WordPress, both…
“The decision to require that every agency have a vulnerability disclosure policy is a major step forward in both increasing security and extending an open…
Today’s update brings you 21 new security modules that test your site for a range of vulnerabilities including more WordPress vulnerabilities and ROCA (vulnerable RSA…