Generative AI: The new attack vector for trust and safety
Threat actors are abusing generative AI to carry out child sex abuse material (CSAM), disinformation, fraud and extremism, according to...
Read more →Threat actors are abusing generative AI to carry out child sex abuse material (CSAM), disinformation, fraud and extremism, according to...
Read more →Claim your free ‘Web Hacking 101’ book today At HackerOne we want our hacker community to be successful. With this...
Read more →Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections,...
Read more →Image credit: Qantas Group Qantas Group has put artificial intelligence at the front-and-centre of ongoing transformation efforts, with the hope...
Read more →UPDATE We had a blast at the AMA! Check out the full dialogue on Reddit! This week on Thursday 25th...
Read more →A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into...
Read more →Pidgey from Pokemon Go looking all mean on the street In case you don’t have time to read three months...
Read more →Last week on Malwarebytes Labs: Update now: 9 vulnerabilities impact Cisco Small Business Series ChatGPT: Cybersecurity friend or foe? Webinar...
Read more →While hunting for bug bounties, attack surface plays a major role. Hacking on mobile adds more juicy attack surface and...
Read more →High quality reports result in higher bounties and happier security teams. The best vulnerability reports provide security teams with all...
Read more →Hello friends, and welcome to HackerOne’s first edition of “Fact or Fiction,” where we review shows and talk about how...
Read more →Today, we are excited to share HackerOne’s 2016 Bug Bounty Hacker Report. Bug bounty programs are flourishing, but without a...
Read more →