Dolly.com pays ransom, attackers release data anyway
06
Jan
2024

Law firm Orrick data breach impacted 638,000 individuals

Law firm Orrick data breach impacted 638,000 individuals Pierluigi Paganini January 06, 2024 Law firm Orrick, Herrington & Sutcliffe disclosed…

23andMe Blames Users for Recent Data Breach as It's Hit With Dozens of Lawsuits
06
Jan
2024

23andMe Blames Users for Recent Data Breach as It’s Hit With Dozens of Lawsuits

It’s been nearly two years since Russia’s invasion of Ukraine, and as the grim milestone looms and winter drags on,…

mert tasci
06
Jan
2024

parameter pollution bug at twitter | by mert tasci

mert tasci · Follow 1 min read · Mar 11, 2023 — 1 Listen Share twitter sent an e-mail to…

Piercing the Veal: Short Stories to Read with Friends | by d0nut
06
Jan
2024

Piercing the Veal: Short Stories to Read with Friends | by d0nut

This feedback mechanism made me realize that this was more than a simple CRUD app and this service must be…

mert tasci
06
Jan
2024

a little open redirect bypass story | by mert tasci

in one private program at bugcrowd, i came across three different open redirect bug methods. firstthis is an effortless open…

My Year in Review — 2020. So | by d0nut
06
Jan
2024

My Year in Review — 2020. So | by d0nut

While terribly disappointed, I still had drive left in me to do well for myself and continue onward. At this…

[tl;dr sec] #212 - AWS Security Services Best Practices, EDR Bypass Lab, 100+ Vulnerable Practice Apps
06
Jan
2024

[tl;dr sec] #212 – AWS Security Services Best Practices, EDR Bypass Lab, 100+ Vulnerable Practice Apps

I hope you’ve been doing well! 👋 New Year, Who Dis? I hope you had a great holiday break and…

mert tasci
06
Jan
2024

xss attack vector at “style” context for less.js – mert tasci

detailless & sass suddenly came to my mind when researching about of css injection attacks. you know, both are css…

The Stony Path of Android 🤖 Bug Bounty – Bypassing Certificate Pinning
06
Jan
2024

The Stony Path of Android 🤖 Bug Bounty – Bypassing Certificate Pinning

Dear readers, Long story short, doing bug bounties for mobile devices is hard. With this article I want to show…

Alyssa Herrera
06
Jan
2024

High Risk Vulnerabilities within the DoD – Exploiting Coldfusion, Dotnet Nuke, Oracle, and more | by Alyssa Herrera

The Department of Defense Launched a bug bounty program on November 21st, 2016 on Hackerone. This allowed researchers to report…

BugBountyHunter Chats — Getting to know 0xblackbird, YouGina, JTCSec and HolyBugx | by Sean (zseano)
06
Jan
2024

BugBountyHunter Chats — Getting to know 0xblackbird, YouGina, JTCSec and HolyBugx | by Sean (zseano)

18 min read · Jul 12, 2021 BugBountyHunter.com opened early November 2020 and the amount of growth we have seen…

Sea Turtle Cyber Espionage Campaign
06
Jan
2024

Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies

Jan 06, 2024NewsroomCyber Espionage / Supply Chain Attack Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish…