Category: Mix
In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great…
Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the…
Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….
Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…
Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the…
TL;DR, Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a…
George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing…
There is a lot think about when it comes to security, but what is the one most important piece of advice…
Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard,…
Our next update is here! Two weeks ago we released the new scan profile overview to make it easier for…
Receiving vulnerabilities has never been easier with the release of our newest integration: Embedded Submissions. What started with Email forwarding…
Update: The new OWASP Top 10 for 2021 proposed has grouped Sensitive Data Exposure with failures related to cryptography into…