Don't let these open-source cybersecurity tools slip under your radar
27
Jan
2025

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
27
Jan
2025

Three privacy rules for 2025 (Lock and Code S06E02)

This week on the Lock and Code podcast… It’s Data Privacy Week right now, and that means, for the most…

Hackerone logo
27
Jan
2025

How to Streamline Your SDLC With Hai

Addressing Inconsistencies in Vulnerability Scanning One of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead…

How to use Apple's App Privacy Report to monitor data tracking
27
Jan
2025

How to use Apple’s App Privacy Report to monitor data tracking

The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact…

Hackerone logo
27
Jan
2025

NIS2: Next Step Forward on EU Security Requirements

NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security…

Print Friendly, PDF & Email
27
Jan
2025

Should You Use Homomorphic Encryption to Secure Your Data? –

If you’ve never heard of homomorphic encryption, you should know many data scientists and information technology (IT) professionals view it…

Hackerone logo
27
Jan
2025

7 Problems With Traditional Pentests

Pentesting has been around for decades, but it hasn’t undergone the revolution that other security practices have. Organizations tend to…

Hackerone logo
27
Jan
2025

How To Find Broken Access Control Vulnerabilities in the Wild

What Is Broken Access Control? BAC is a class of application vulnerability where a function or asset in the application…

Hackerone logo
27
Jan
2025

How an IDOR Vulnerability Led to User Profile Modification

According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government…

Hackerone logo
27
Jan
2025

The Recruitment Process: What to Expect When You Apply at HackerOne

If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to…

http://i.imgur.com/YGhvYJf.png
27
Jan
2025

Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)

Exploiting Markdown Syntax Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don’t need to…

Abusing URL Shortners to discover sensitive resources or assets
27
Jan
2025

Abusing URL Shortners to discover sensitive resources or assets

September 23 2015 · websec bruteforce As of late, a fair few companies and startups have been using dedicated URL…