Crypto Discord Communities Targeted by Malicious Bookmarks & JavaScript
31
May
2023

Crypto Discord Communities Targeted by Malicious Bookmarks & JavaScript

Several crypto-based Discord communities, including Aura Network, MetrixCoin, and Nahmii, have already fallen victim to the attack. Discord communities have…

ASUS Vulnerability Disclosure Déjà vu
31
May
2023

Open Source Hacking | Creating the Best Open Source Environment 

In 2014, HackerOne launched their first open source project and two years in, we have 50 contributors, received over 450…

Amazon
31
May
2023

Amazon faces $30 million fine over Ring, Alexa privacy violations

Amazon will pay $30 million in fines to settle allegations of privacy violations related to the operation of its Ring…

Kali Linux
31
May
2023

Kali Linux 2023.2 released with 13 new tools, pre-built HyperV image

Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools,…

Slack Increases Bounty Minimums For the Next 90 Days
31
May
2023

6 Ways to Build Great Relationships with Security Teams

One of the most common questions we get from new hackers is “How can I get along better with security…

Smiley
31
May
2023

Terminator antivirus killer is a vulnerable Windows driver in disguise

A threat actor known as Spyboy is promoting a tool called “Terminator” on a Russian-speaking hacking forum that can allegedly…

Shadow Data Concerns, Public Cloud Breaches Remain Sky-High: Here’s How Organizations Can Protect Themselves
31
May
2023

Shadow Data Concerns, Public Cloud Breaches Remain Sky-High: Here’s How Organizations Can Protect Themselves

By Andy Smith, Chief Marketing Officer, The same technologies powering cloud transformation and data democratization are also introducing the greatest…

Breaking Down the Benefits of Hacker-Powered Pen Tests
31
May
2023

Hacker Blogs We Love Reading

UPDATED: Please note that we updated this post on 5/5 with even more blogs our hackers suggested. Thank you! Hackers…

Hacker
31
May
2023

Hackers exploit critical Zyxel firewall flaw in ongoing attacks

Hackers are performing widespread exploitation of a critical-severity command injection flaw in Zyxel networking devices, tracked as CVE-2023-28771, to install…

Generative AI boosts HPE Q2 earnings
31
May
2023

Generative AI boosts HPE Q2 earnings

Hewlett Packard Enterprise (HPE) has posted second-quarter revenue of $7.0bn, up 4% from the same quarter last year. While its…

31
May
2023

Hack the Pentagon Bug Bounty Program Launches on HackerOne

Hack the Pentagon?! On Thursday, March 31, 2016, the Department of Defense, arguably the world’s most powerful organization, announced it…

Bitdefender Introduces GravityZone Security for Android, iOS, and Chromebook
31
May
2023

Bitdefender Introduces GravityZone Security for Android, iOS, and Chromebook

Bitdefender has launched GravityZone Security for Mobile, a next-generation mobile security solution designed to provide organizations with advanced Mobile Threat…