Category: Mix

Introducing the Wallarm Q2 2024 API ThreatStats™ Report
16
Aug
2024

Introducing the Wallarm Q2 2024 API ThreatStats™ Report

As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our…

@Itsirkov on the business of ethical hacking 
16
Aug
2024

@Itsirkov on the business of ethical hacking 

Once viewed with caution, ethical hackers are now regarded as an essential asset for many cybersecurity teams around the globe….

The software leadership top 5
16
Aug
2024

The software leadership top 5

The more you advance towards leadership in your tech career, the less technical your focus becomes. The most helpful things…

Hackerone logo
14
Aug
2024

Anthropic Expands Their Model Safety Bug Bounty Program

Expanding Our Model Safety Bug Bounty Program  The rapid progression of AI model capabilities demands an equally swift advancement in…

Hackerone logo
14
Aug
2024

How Hai’s Report Summarization Turns Complex Data Into Actionable Insights

Enter HackerOne’s AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board. Hai is…

Hackerone logo
14
Aug
2024

Hack My Career: Meet Alek Relyea

Alek is a perfect example of persistence and adaptability, even without a traditional tech background, which can lead to success…

Hackerone logo
14
Aug
2024

Is Your Security Ready For Bug Bounty? [5 Questions]

1. Are You Prepared to Manage Incoming Vulnerability Reports? Naturally, the purpose of running a bug bounty program is to…

Extracting a Single Page from a PDF on macOS
11
Aug
2024

Extracting a Single Page from a PDF on macOS

Your browser does not support the audio element. I frequently find myself needing to extract just one page from a…

Intigriti announces authorization as a CVE Numbering Authority (CNA)
08
Aug
2024

Intigriti announces authorization as a CVE Numbering Authority (CNA)

London, UK & Antwerp, Belgium – Aug 06 – Intigriti, a leading platform in vulnerability management and bug bounty, announces…

☝️340 secretos JWT débiles que debes revisar en tu código
08
Aug
2024

☝️340 secretos JWT débiles que debes revisar en tu código

¿Qué pasa con JWT? El token web JSON, usualmente identificado por sus siglas JWT, brinda un recurso eficaz para autenticar…

A complete guide to exploiting advanced SSRF vulnerabilities
07
Aug
2024

A complete guide to exploiting advanced SSRF vulnerabilities

SSRF—short for Server-Side Request Forgery—vulnerabilities are amongst one of the most impactful web security vulnerabilities. Even though they are less…

Streamlining Tweet Creation from Markdown
06
Aug
2024

Streamlining Tweet Creation from Markdown

As an experience engineer, I’m always looking for ways to streamline my workflow. Recently, I developed a nifty solution to…