27
Apr
2023

The true numbers behind deepfake fraud

The use of artificial intelligence can result in the production of deepfakes that are becoming more realistic and challenging to…

The Evolution of HackerOne's Live Hacking Events
27
Apr
2023

The Evolution of HackerOne’s Live Hacking Events

If you’ve heard of HackerOne, then you’ve heard about our Live Hacking Events. For years, we’ve been bringing together the…

New Phishing Attacks
27
Apr
2023

New Phishing Attacks Using ChatGPT

Phishing has been one of the greatest threats to organizations, growing year after year. Phishing attacks have contributed to 90%…

27
Apr
2023

Generative AI and security: Balancing performance and risk

Are we moving too fast with AI? This is a central question both inside and outside the tech industry, given…

Detectify Security Updates for November 16
27
Apr
2023

Detectify Security Updates for November 16

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

27
Apr
2023

eBook: Security Compliance for CISOs

Security compliance often feels like the ever-present task that looms over every angle of your role as Chief Information Security…

Reflected Cross-Site Scripting in cPanel (CVE-2023-29489) – Assetnote
27
Apr
2023

Reflected Cross-Site Scripting in cPanel (CVE-2023-29489) – Assetnote

Summary A reflected cross-site scripting vulnerability can be exploited without any authentication in affected versions of cPanel. The XSS vulnerability…

27
Apr
2023

CISOs struggle to manage risk due to DevSecOps inefficiencies

As their hybrid and multicloud environments become more complex, and teams continue to rely on manual processes that make it…

Fake Flipper Zero sellers are after your money
27
Apr
2023

Fake Flipper Zero sellers are after your money

Flipper Zero units are being sold on sites not recognized by developers. Stay away! Thanks to Malwarebytes’ Stefan Dasic who…

How to Use Bug Bounty Program Data to Improve Security and Development
27
Apr
2023

How to Use Bug Bounty Program Data to Improve Security and Development

At HackerOne’s 2021 Security@ conference, two experienced HackerOne program managers, Allie Lugton and Denzel Duncan held a session on tracking…

Decoy dog toolkit plays the long game with Pupy RAT
27
Apr
2023

Decoy dog toolkit plays the long game with Pupy RAT

We take a look at the discovery of a long running malware toolkit campaign evading detection through its use of…

ecommerce security scan
27
Apr
2023

How to “winterize” and secure your eCommerce website for the holidays

With online retailers and shoppers busy focusing on the upcoming holiday shopping season, cybercriminals are on the hunt for unsuspecting…