Category: Mix

Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients | by Jonathan Bouman | Mar, 2024
21
Mar
2024

Bricks Huisarts v2.3.12.94166 vulnerable to executable uploads in e-consultation send by patients | by Jonathan Bouman | Mar, 2024

Ransomware attacks in healthcare are our biggest threat according to the annual report of Z-Cert.nl. In this report it’s mentioned…

Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers | by Jonathan Bouman | Mar, 2024
21
Mar
2024

Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers | by Jonathan Bouman | Mar, 2024

Ransomware attacks in healthcare are our biggest threat according to the annual report of Z-Cert.nl. In this report it’s mentioned…

Pkl - Apple’s config lang
21
Mar
2024

Smuggling with JSON | HAHWUL

JSON은 YAML과 함께 자주 사용되는 포맷 중 하나입니다. K:V 형태의 단순한 구성이지만, JSON의 특성을 이용하면 데이터를 숨기고 Application의 잘못된 동작을…

Hackerone logo
21
Mar
2024

AI Safety vs. AI Security [2 Types of AI Red Teaming]

What Is the Difference Between Red Teaming For AI Safety and AI Security? AI red teaming is a form of…

Hackerone logo
21
Mar
2024

Decoding the Characteristics of Modern Pentesting: Effectiveness

Quality/Effectiveness: Effectiveness measures the method’s ability to provide reliable and accurate vulnerability detections, comprehensive system coverage, compliance with standards, and…

Hackerone logo
21
Mar
2024

Reversing The Trend: Support and Mediation Win as a Team

It was a daunting task, especially considering the target was hovering around 52% at the time. But as the team…

Meet the hacker: HG_Real - Intigriti
20
Mar
2024

Meet the hacker: HG_Real – Intigriti

In cybersecurity, ethical hackers are like digital guardians, keeping our online world safe. Game hacking adds a twist to this,…

Announcing Intigriti's Brinqa Integration  - Intigriti
20
Mar
2024

Announcing Intigriti’s Brinqa Integration  – Intigriti

We’re happy to announce Intigriti’s latest partnership with Brinqa, a leader in vulnerability management. This integration marks a significant step…

NIS2 Directive, CER, and DORA compliance challenges
20
Mar
2024

NIS2 Directive, CER, and DORA compliance challenges

**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are…

View vulnerabilities on Attack Surface page
20
Mar
2024

Significant changes to attack surface overview and many new tests

The new attack surface overview puts the changes and potential risky exposures to your attack surface front and center. But…

The AI Coin-sorter Analogy
19
Mar
2024

The AI Coin-sorter Analogy

I’ve had this analogy in my mind for a while for AI. Specifically, neural nets. Imagine a coin sorter with…

Top 5 Data Breaches That Cost Millions
18
Mar
2024

Top 5 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using…