Category: Mix

Who's building it? · Joseph Thacker
03
Oct
2024

Who’s building it? · Joseph Thacker

Andrej Karpathy recently tweeted this: “Input optional product Don’t ask your users for input. Coming up with input is hard,…

Hackerone logo
01
Oct
2024

NIS2: Next Step Forward on EU Security Requirements

NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security…

Hackerone logo
01
Oct
2024

How To Find Broken Access Control Vulnerabilities in the Wild

What Is Broken Access Control? BAC is a class of application vulnerability where a function or asset in the application…

API Gateways and API Protection: What’s the Difference?
01
Oct
2024

API Gateways and API Protection: What’s the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems….

SSO vs MFA/2FA—and the cost of insecure logins
01
Oct
2024

SSO vs MFA/2FA—and the cost of insecure logins

Between 2004 and 2024, passwords topped the list as the most frequently leaked type of data. It’s safe to say…

7 Tips for bug bounty beginners
01
Oct
2024

7 Tips for bug bounty beginners

We all had to start somewhere in bug bounty hunting and we all made mistakes along the way. Most of…

Policy, SOPs, and AI Are All You Need
29
Sep
2024

Policy, SOPs, and AI Are All You Need

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Security Update: Critical CUPS Vulnerability
27
Sep
2024

Security Update: Critical CUPS Vulnerability

A group of vulnerabilities (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) within OpenPrinting CUPS (the standard open-source printing system present in most…

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810
26
Sep
2024

Envoy API Security Vulnerabilities: CVE-2024-45806, 45809, 45810

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes….

Hackerone logo
26
Sep
2024

How to Streamline Your SDLC With Hai

Addressing Inconsistencies in Vulnerability Scanning One of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead…

What is a bug bounty program? A guide for businesses
25
Sep
2024

What is a bug bounty program? A guide for businesses

Bug bounty programs have proven to be an effective strategy for companies looking to proactively enhance their security posture. As…

API Security: The 6 biggest challenges AppSec teams face, and how to solve them. | Blog
24
Sep
2024

API Security: The 6 biggest challenges AppSec teams face, and how to solve them. | Blog

Rob Samuels | 24 September 2024 at 10:01 UTC AppSec teams face a wide range of challenges when securing their…