A Thank You to the Hacker Community, From HackerOne
When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief Hacking Officer, I see the…
When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief Hacking Officer, I see the…
TL/DR: Gender inequality and the lack of women is ubiquitous in tech companies – more so in cybersecurity. While it has been a debate that’s…
I’ve been going hardcore on using GPT to create essays, reports, and other kinds of analysis. I’ve had tons of success with it, and it’s…
How to take advantage of a simple GitHub Actions workflow without sacrificing agnostic tooling. Agnostic tooling is the clever notion that you should be able…
So, who is Corb3nik? My name is Ian, also known as Corb3nik on social media. I’m a long time CTF enthusiast and bug bounty hunter.…
TL/DR: Attackers and defenders or security professionals often look at an attack surface from a completely different perspective. The gap between those two perspectives is…
A guide to overcoming the GitHub event data horizon with a little command-line magic. Teams who work on GitHub rely on event data to collaborate.…
In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to keep up. But how are…
TL/DR: Just as vulnerabilities are constantly evolving, so must your approach to external attack surface monitoring. In addition to our ongoing Crowdsource security research, we…
Created/Updated: April 18, 2023 This is harder than it should be. Way harder. 0. Enable your terminal to make changes Open System Settings -> Privacy…
How a simple scheduled job can help you quickly recover from ransomware. It’s 2019, and ransomware has become a thing. Systems that interact with the…
This blog post is part 1 of an ongoing series that provide deep dives into HackerOne Assets and its core capabilities. Having the right automated…