Category: Mix

Hacking misconfigured Cloudflare R2 buckets: a complete guide
22
Sep
2024

Hacking misconfigured Cloudflare R2 buckets: a complete guide

Cloudflare R2 buckets are recently becoming more popular as an alternative to AWS S3 buckets for their simplicity, integration support…

Hackerone logo
20
Sep
2024

How to Accelerate Vulnerability Remediation with Hai

The Challenge of Vulnerability Remediation When a vulnerability is identified, teams must determine the best approach to fixing it. This…

Chicago API Security Summit 2024
20
Sep
2024

Chicago API Security Summit 2024

Thank You Chicago! Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well,…

Hackerone logo
19
Sep
2024

Introducing HackerOne Automations | HackerOne

Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains…

Debugging LazyVim's Root Directory Behavior
19
Sep
2024

Debugging LazyVim’s Root Directory Behavior

Today, I stumbled upon an interesting quirk while working on a Chrome Extension project using LazyVim. It’s a classic case…

The Art Quality Tier List (AQTL)
16
Sep
2024

The Art Quality Tier List (AQTL)

I think I just figured out what art is. Took me decades. Here’s my definition, which has two primary components:…

Finding Bugs With Nuclei: Templates, Resources, and Tools
13
Sep
2024

Finding Bugs With Nuclei: Templates, Resources, and Tools

Nuclei scans stuff for vulnerabilities. What does it scan? Modern applications, infrastructure, cloud platforms, and networks. How does it work?…

Fundamentals of GraphQL-specific attacks - API Security
13
Sep
2024

Fundamentals of GraphQL-specific attacks – API Security

GraphQL vs REST APIs Developers are constantly exploring new technologies that can improve the performance, flexibility, and usability of applications. GraphQL…

Hackerone logo
12
Sep
2024

Hack My Career: Harley Kimball’s Journey to DEFCON

In this interview, we explore Harley’s experience at DEFCON, the world’s largest hacker convention, where he took his skills to…

Hackerone logo
12
Sep
2024

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

Learn more about bug bounty programs and how they work > The Growing Trend At HackerOne, we’ve observed a notable…

Burp Suite Performance Improvements | Blog
11
Sep
2024

Burp Suite Performance Improvements | Blog

Daniel Allen | 11 September 2024 at 06:53 UTC Performance is a critical factor in the usability and efficiency of…

Hackerone logo
11
Sep
2024

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…