Category: Mix

Hackerone logo
28
May
2024

HackerOne Spot Checks for On-Demand, Targeted Security Testing

Should teams prioritize conducting thorough security checks or accelerating product timelines?  Striking a balance between these competing priorities is essential,…

The critical role of VDPs in cybersecurity
28
May
2024

The critical role of VDPs in cybersecurity

Cybercrime is projected to cost global enterprises a staggering $10.5 trillion annually by 2025, meaning the importance of robust cybersecurity…

Bug Bounty Calculator—Crunch the numbers and optimize your VDP 
28
May
2024

Bug Bounty Calculator—Crunch the numbers and optimize your VDP 

Introducing Intigriti’s enhanced Bug Bounty Calculator! In a rapidly expanding bug bounty marketplace, staying competitive is key. Our free-to-use tool…

Hackerone logo
24
May
2024

AI Development and System Design [With Real AI Developers]

During our recent webinar, Beyond the Algorithm: AI Developers’ Ask-Me-Anything, four seasoned AI engineers discussed details and questions about applied AI…

Triage: The not-so-secret hack to impactful bug bounty programs 
23
May
2024

Triage: The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Hackerone logo
22
May
2024

What You Need to Know About the EU’s Cyber Resilience Act

The CRA Introduces Mandatory Cybersecurity Requirements The European CRA creates mandatory cybersecurity requirements for hardware and software with digital elements. The…

The mutual benefits of bug bounty programs
22
May
2024

The mutual benefits of bug bounty programs

Bug bounty programs are a pivotal tool in the cybersecurity landscape, offering a win-win situation for organizations looking to boost…

Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices
21
May
2024

Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices

Introduction In May 2024, new vulnerabilities have been identified in BIG-IP Next Central Manager, raising considerable security concerns. This discovery…

Hackerone logo
21
May
2024

Community-driven PTaaS vs. Automated Pentesting

Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However,…

Hackerone logo
21
May
2024

What Is a Business Logic Vulnerability? [Example]

It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized…

Hackerone logo
21
May
2024

Security@: The Top 3 Lessons From Security Leaders

HackerOne’s Security@ conferences are exclusive events that bring together customers, hackers, and industry experts to share opinions and advice about…

Dell Data Breach - PII of 49 Million Customers Compromised
20
May
2024

Dell Data Breach – PII of 49 Million Customers Compromised

Dell recently issued a notice regarding a data breach that occurred on May 9, which has reportedly affected over 49…