Category: Mix

#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek
18
May
2023

Financial Services: Tips for Bug Bounty Success

In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
18
May
2023

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the…

How does Pentesting fit into your overall security strategy?
18
May
2023

What To Do When You’re Stuck Hacking

Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….

OWASP TOP 10: XXE - Detectify Blog
18
May
2023

OWASP TOP 10: Security Misconfiguration

Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…

Crowdsourcing Racial Justice and Equality
18
May
2023

Discovering programs is easier than ever with the new and improved Program Directory

Today, we’re excited to announce an overhaul of the HackerOne Program Directory! Since its launch, Hackers have been using the…

SPF Record Research - Detectify Blog
18
May
2023

Misconfigured email servers open the door to spoofed emails from top domains

TL;DR,  Missing SPF records are a common and long-standing security issue that puts sensitive information at risk. To get a…

h1-415 CTF Winners Announced! | HackerOne
18
May
2023

Security@ 2018: Sumo Logic’s CSO On Transparency and Using Hacker-Powered Pen Tests for Better Security and Complete Compliance

George Gerchow isn’t afraid to tell it like it is. As the CSO of Sumo Logic, he’s responsible for securing…

IT Security FAQ: what should you do to protect yourself online? What is the number one everyday mistake people make?
18
May
2023

IT Security FAQ: what should you do to protect yourself online? What is the number one everyday mistake people make?

There is a lot think about when it comes to security, but what is the one most important piece of advice…

LINE Security Bug Bounty Program Report 2019
18
May
2023

Security@ 2018: Oath, DoD Highlight Value in Bringing Bug Bounties to Life

Most hacker-powered security happens remotely, with digital messaging being the typical communication channel. There’s no brainstorming together with a whiteboard,…

Detectify Navigation
18
May
2023

[Release] New dashboard, navigation and better support for unlimited scan profiles

Our next update is here! Two weeks ago we released the new scan profile overview to make it easier for…

h1-415 CTF Winners Announced! | HackerOne
18
May
2023

Integrate HackerOne directly into your website with Embedded Submissions

Receiving vulnerabilities has never been easier with the release of our newest integration: Embedded Submissions. What started with Email forwarding…

OWASP TOP 10: XXE - Detectify Blog
18
May
2023

OWASP TOP 10: Sensitive Data Exposure

Update: The new OWASP Top 10 for 2021 proposed has grouped Sensitive Data Exposure with failures related to cryptography into…