Category: Mix

Hackerone logo
28
Nov
2024

Why Retail and E-commerce Organizations Trust Security Researchers During the Holiday Shopping Season

Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to…

Hackerone logo
28
Nov
2024

Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board

CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….

Hackerone logo
27
Nov
2024

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Hackerone logo
27
Nov
2024

Why This Moment In Cybersecurity Needs Hackers To Protect All Software

Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…

A complete guide for beginners
27
Nov
2024

A complete guide for beginners

Bug bounty hunting can seem overwhelming when you’re just starting, especially when you are coming from a non-technical background. And…

Hackerone logo
27
Nov
2024

Network and Information Systems Directive (NIS2) Compliance: What You Need to Know

This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament…

Emerging technologies and their security implications
27
Nov
2024

Emerging technologies and their security implications

As organizations continue adopting emerging technologies, they gain immense benefits but also face new security challenges. Cloud computing, AI, IoT,…

How Is API Abuse Different from Web Application Attacks by Bots?
27
Nov
2024

How Is API Abuse Different from Web Application Attacks by Bots?

API abuse and web application bot attacks are often confused. This is understandable, as both involve automated interactions and are…

Remote Code Execution with Spring Properties
27
Nov
2024

Remote Code Execution with Spring Properties

Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were…

Hackerone logo
26
Nov
2024

5 Insights Attendees Gained from the Security@ World Tour

If you weren’t lucky enough to catch us at a roadshow event, you’ll be delighted to know you can catch…

Evolving attack techniques and tactics
22
Nov
2024

Evolving attack techniques and tactics

As cyber attackers refine their skills, their methods evolve to exploit vulnerabilities in innovative and increasingly difficult-to-detect ways. The modern…

Hackerone logo
21
Nov
2024

How an MFA Bypass Led to Account Takeover [Plus 11 Authentication Tips]

Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…