Using ngrok to proxy internal servers in restrictive environments
27
Jan
2025

Using ngrok to proxy internal servers in restrictive environments

When gaining shell access to a machine on a network, a promising attack vector is to check the internal network…

Gaining access to Uber's user data through AMPScript evaluation
27
Jan
2025

Gaining access to Uber’s user data through AMPScript evaluation

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Hackerone logo
26
Jan
2025

European Council Adopts Cyber Resilience Act

The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…

Discovering a zero day and getting code execution on Mozilla's AWS Network
26
Jan
2025

Discovering a zero day and getting code execution on Mozilla’s AWS Network

When Assetnote Continuous Security (CS) monitors your attack surface, one of the things it looks for are instances of WebPageTest….

Hackerone logo
26
Jan
2025

How To Use HackerOne’s Global Vulnerability Policy Map

To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability…

Finding Hidden Files and Folders on IIS using BigQuery
26
Jan
2025

Finding Hidden Files and Folders on IIS using BigQuery

Motivations I recently made a video on how to find hidden files and folders on IIS through the use of…

Hackerone logo
26
Jan
2025

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are…

Ransomware gang uses SSH tunnels for stealthy VMware ESXi access
26
Jan
2025

Ransomware gang uses SSH tunnels for stealthy VMware ESXi access

Ransomware actors targeting ESXi bare metal hypervisors are leveraging SSH tunneling to persist on the system while remaining undetected. VMware…

Change Healthcare data breach exposed the private data of over half the U.S.
26
Jan
2025

Change Healthcare data breach exposed the private data of over half the U.S.

Change Healthcare data breach exposed the private data of over half the U.S. Pierluigi Paganini January 26, 2025 The Change…

Hackerone logo
26
Jan
2025

OWASP Top 10: The Risk of Cryptographic Failures

What Is Cryptography? Cryptography is the practice and study of techniques for securing communication and information by transforming it into…

UnitedHealth header image
26
Jan
2025

UnitedHealth now says 190 million impacted by 2024 data breach

UnitedHealth has revealed that 190 million Americans had their personal and healthcare data stolen in the Change Healthcare ransomware attack,…

Hackerone logo
26
Jan
2025

AWS Security Configuration Review and Best Practices

In fact, the Cloud Security Alliance’s Top Threats to Cloud Computing 2024 Report ranks the following concerns as the top three:…