Category: Mix
Hacktivity can save your company. Take help from hackers. You can’t do it alone. Approach hackers with an assumption of…
Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. A proof of concept video follows…
In the last two parts of this series, we discussed the AWS Shared Responsibility Model. We started with keeping your…
We’ve got some cool events coming up and we’re looking forward to discussing security at tech conferences, meetups and webinars. Check…
“I think we found something good,” said hackers @sumlac, @teknogeek, and @johnny said to a member of the MARFORCYBER team…
Sucuri recently discovered a stored XSS in all versions from 2.0 (released in November 2012) of the popular WordPress plugin Jetpack. The plugin…
In 2016, the DoD said Yes to cyber help by launching the Hack the Pentagon program. It took 13 minutes…
On May 11th, we co-organised a PHP security meetup together with PHP Stockholm at SUP46, where our knowledge advisor Frans…
For the first time, HackerOne kicked off fall by migrating south. Way south. All the way to Buenos Aires, Argentina!…
Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our…
Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the…
Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method,…