Make Your Cybersecurity Dollars Last Longer
In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to keep up. But how are…
In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to keep up. But how are…
TL/DR: Just as vulnerabilities are constantly evolving, so must your approach to external attack surface monitoring. In addition to our ongoing Crowdsource security research, we…
Created/Updated: April 18, 2023 This is harder than it should be. Way harder. 0. Enable your terminal to make changes Open System Settings -> Privacy…
How a simple scheduled job can help you quickly recover from ransomware. It’s 2019, and ransomware has become a thing. Systems that interact with the…
This blog post is part 1 of an ongoing series that provide deep dives into HackerOne Assets and its core capabilities. Having the right automated…
Numerous vulnerabilities have been found this week in Spring, a popular Java Web app development framework from VMware. Detectify Surface Monitoring and Application Scanning customers…
A tour of brace expansion, shell parameter expansions, and playing with substrings in Bash. It’s that time of year again! When stores start putting up…
Hello world, we are the Mediation Team. For those who don’t know what we do – we are here to help the ethical hacking community…
TL/DR: The past six months have brought some herculean security issues such as Log4j and the more recent Spring4Shell. It’s now not uncommon to hear…
Why IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas. Giving someone a puppy for Christmas might work…
Did you know HackerOne has had a Make It Right fund for years? Often, programs and hackers come to agreeable solutions on reports according to…
TL/DR: Users now get additional insights on what is discovered on the attack surface. This includes information such as when an asset was last seen…