Threat actors are abusing generative AI to carry out child sex abuse material (CSAM), disinformation, fraud and extremism, according to…
Claim your free ‘Web Hacking 101’ book today At HackerOne we want our hacker community to be successful. With this…
Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections,…
Image credit: Qantas Group Qantas Group has put artificial intelligence at the front-and-centre of ongoing transformation efforts, with the hope…
UPDATE We had a blast at the AMA! Check out the full dialogue on Reddit! This week on Thursday 25th…
A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into…
Pidgey from Pokemon Go looking all mean on the street In case you don’t have time to read three months…
Last week on Malwarebytes Labs: Update now: 9 vulnerabilities impact Cisco Small Business Series ChatGPT: Cybersecurity friend or foe? Webinar…
While hunting for bug bounties, attack surface plays a major role. Hacking on mobile adds more juicy attack surface and…
High quality reports result in higher bounties and happier security teams. The best vulnerability reports provide security teams with all…
Hello friends, and welcome to HackerOne’s first edition of “Fact or Fiction,” where we review shows and talk about how…
Today, we are excited to share HackerOne’s 2016 Bug Bounty Hacker Report. Bug bounty programs are flourishing, but without a…










