Category: Mix

Introducing read-only user roles - Intigriti
17
Apr
2024

Introducing read-only user roles – Intigriti

We’re excited to introduce the new read-only user roles to our platform, available under the roles “Program reader” and “Group…

Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics
14
Apr
2024

Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics

A severe command injection vulnerability in the GlobalProtect Gateway feature of PAN-OS versions 10.2, 11.0, and 11.1 underscores the critical…

Hackerone logo
12
Apr
2024

HackerOne Company Values Matter: Default to Disclosure

Each year, HackerOne employees nominate peers to receive the covetable Values Awards. Five Hackeronies are recognized for their unique contribution…

Bug bounty ROI: Can investing in crowdsourced security help mitigate costly security breaches? 
12
Apr
2024

Bug bounty ROI: Can investing in crowdsourced security help mitigate costly security breaches? 

Factoring in whether to allocate resources for a bug bounty program in your annual cybersecurity budget can be a challenging…

Hackerone logo
11
Apr
2024

How a Race Condition Vulnerability Could Cast Multiple Votes

Race condition vulnerabilities make up less than 0.3% of reports on the HackerOne platform. However, researchers have recently been particularly…

Hackerone logo
11
Apr
2024

HackerOne’s Digital First Workplace | HackerOne

This is an overview of the conversation and some of the best practices shared when creating a remote workplace. Listen…

Hackerone logo
11
Apr
2024

HackerOne Company Values Matter: Lead with Integrity

Each year, HackerOne employees nominate peers to receive the covetable Values Awards. Five Hackeronies are recognized for their unique contribution…

Hackerone logo
11
Apr
2024

How to Measure the Value of Pentesting [4 Metrics]

Effectiveness: Effectiveness measures the method’s ability to provide reliable and accurate vulnerability detections, comprehensive system coverage, compliance with standards, and…

Hackerone logo
11
Apr
2024

HackerOne Celebrates Global Work from Home Day

Flexibility Redefined One of the advantages of digital first work is the flexibility it offers employees. Our recent employee engagement…

Hackerone logo
09
Apr
2024

The Importance of Credential Rotations: Best Practices for Security and Data Protection

The Significance of Credential Rotations In today’s digital landscape, the significance of regular credential rotations cannot be overstated. Unfortunately, not…

Top 6 Data Breaches That Cost Millions
08
Apr
2024

Top 6 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using…

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts
08
Apr
2024

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

APIs (Application Programming Interfaces) have proliferated widely, which increases their susceptibility to various vulnerabilities. In the realm of web applications,…