By Jobert Abma This is part 1 in a series of blog posts on HackerOne’s Triage Services. Triage is critical…
TikTok user data is exposed to Chinese ByteDance employees, a screen recording app goes rogue in Google Play, and privacy…
The Bug Bounty Field Manual is the definitive guide on how to plan, launch, and operate a successful bug bounty…
According to a report in the German newspaper Handelsblatt, Tesla Inc consumers made over 2,400 complaints about self-acceleration issues and 1,500…
Hackers, do you have what it takes to hack the U.S. Air Force? Register now to participate in the Department…
May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation…
Today we launch a new product, designed for every security team that runs periodic testing of web applications. HackerOne Challenge…
Getting around Windows XP’s activation scheme has never been an impossible challenge for individuals with adequate time, a sense of…
Based on reports from Jeremiah Fowler, a non-password-protected database exposed nearly 360 million records related to a VPN. The database…
A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to…
by Joshua Moore, Senior Investigator – DarkInvader The internet continues to be a dark place for businesses. In fact, organizations…
Did you miss our webinar with GitLab, Innovating Faster Without Sacrificing Security or Quality? It is jam packed with insights…