Discovering a zero day and getting code execution on Mozilla's AWS Network
26
Jan
2025

Discovering a zero day and getting code execution on Mozilla’s AWS Network

When Assetnote Continuous Security (CS) monitors your attack surface, one of the things it looks for are instances of WebPageTest….

Hackerone logo
26
Jan
2025

How To Use HackerOne’s Global Vulnerability Policy Map

To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability…

Finding Hidden Files and Folders on IIS using BigQuery
26
Jan
2025

Finding Hidden Files and Folders on IIS using BigQuery

Motivations I recently made a video on how to find hidden files and folders on IIS through the use of…

Hackerone logo
26
Jan
2025

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are…

Ransomware gang uses SSH tunnels for stealthy VMware ESXi access
26
Jan
2025

Ransomware gang uses SSH tunnels for stealthy VMware ESXi access

Ransomware actors targeting ESXi bare metal hypervisors are leveraging SSH tunneling to persist on the system while remaining undetected. VMware…

Change Healthcare data breach exposed the private data of over half the U.S.
26
Jan
2025

Change Healthcare data breach exposed the private data of over half the U.S.

Change Healthcare data breach exposed the private data of over half the U.S. Pierluigi Paganini January 26, 2025 The Change…

Hackerone logo
26
Jan
2025

OWASP Top 10: The Risk of Cryptographic Failures

What Is Cryptography? Cryptography is the practice and study of techniques for securing communication and information by transforming it into…

UnitedHealth header image
26
Jan
2025

UnitedHealth now says 190 million impacted by 2024 data breach

UnitedHealth has revealed that 190 million Americans had their personal and healthcare data stolen in the Change Healthcare ransomware attack,…

Hackerone logo
26
Jan
2025

AWS Security Configuration Review and Best Practices

In fact, the Cloud Security Alliance’s Top Threats to Cloud Computing 2024 Report ranks the following concerns as the top three:…

The Relationship Between Network and Security: Why They’re Ditching the “It’s Your Fault” Game
26
Jan
2025

The Relationship Between Network and Security: Why They’re Ditching the “It’s Your Fault” Game

Remember the good old days of IT? Back when firewalls were like bouncers at a nightclub, and security was a…

INE Security Alert: Expediting CMMC 2.0 Compliance - GBHackers Security
26
Jan
2025

INE Security Alert: Expediting CMMC 2.0 Compliance – GBHackers Security

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…

cybernewswire
26
Jan
2025

INE Security Alert: Expediting CMMC 2.0 Compliance

Cary, North Carolina, January 26th, 2025, CyberNewsWire INE Security, a leading global provider of cybersecurity training and certifications, today announced…