Bug Bytes #196 – Prompt Injection, Self Healing Code, Access Control and Hacker Motivation
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by...
Read more →Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by...
Read more →October is Cybersecurity Awareness Month, but at HackerOne, we’ve decided it should be Hacker Awareness Month. We want to spend...
Read more →TLDR: Proactive external attack surface management (EASM) has become increasingly important than ever before as organizations face an expanding threat...
Read more →A fast command line interface solution for batch image processing. Part of my Hugo site continuous deployment workflow is the...
Read more →In the last two years of their bug bounty program, the hacker community has helped TikTok identify and disclose 450...
Read more →TL/DR: Much like Darlene Alderson from Mr Robot, Goonjeta Malhotra entered the hacking battleground and sharpened her chops after taking...
Read more →My Makefile for building this site, optimizing images, and running my CI/CD GitHub Actions flow. Fun fact: I first launched...
Read more →When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief...
Read more →TL/DR: Gender inequality and the lack of women is ubiquitous in tech companies – more so in cybersecurity. While it...
Read more →I’ve been going hardcore on using GPT to create essays, reports, and other kinds of analysis. I’ve had tons of...
Read more →How to take advantage of a simple GitHub Actions workflow without sacrificing agnostic tooling. Agnostic tooling is the clever notion...
Read more →So, who is Corb3nik? My name is Ian, also known as Corb3nik on social media. I’m a long time CTF...
Read more →