Hackerone logo
27
Jan
2025

NIS2: Next Step Forward on EU Security Requirements

NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security…

Print Friendly, PDF & Email
27
Jan
2025

Should You Use Homomorphic Encryption to Secure Your Data? –

If you’ve never heard of homomorphic encryption, you should know many data scientists and information technology (IT) professionals view it…

Hackerone logo
27
Jan
2025

7 Problems With Traditional Pentests

Pentesting has been around for decades, but it hasn’t undergone the revolution that other security practices have. Organizations tend to…

Hackerone logo
27
Jan
2025

How To Find Broken Access Control Vulnerabilities in the Wild

What Is Broken Access Control? BAC is a class of application vulnerability where a function or asset in the application…

Hackerone logo
27
Jan
2025

How an IDOR Vulnerability Led to User Profile Modification

According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government…

Hackerone logo
27
Jan
2025

The Recruitment Process: What to Expect When You Apply at HackerOne

If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to…

http://i.imgur.com/YGhvYJf.png
27
Jan
2025

Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)

Exploiting Markdown Syntax Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don’t need to…

Abusing URL Shortners to discover sensitive resources or assets
27
Jan
2025

Abusing URL Shortners to discover sensitive resources or assets

September 23 2015 · websec bruteforce As of late, a fair few companies and startups have been using dedicated URL…

Hackerone logo
27
Jan
2025

Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in —…

Using ngrok to proxy internal servers in restrictive environments
27
Jan
2025

Using ngrok to proxy internal servers in restrictive environments

When gaining shell access to a machine on a network, a promising attack vector is to check the internal network…

Gaining access to Uber's user data through AMPScript evaluation
27
Jan
2025

Gaining access to Uber’s user data through AMPScript evaluation

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Hackerone logo
26
Jan
2025

European Council Adopts Cyber Resilience Act

The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…