QBot malware abuses Windows WordPad EXE to infect devices
The QBot malware operation has started to abuse a DLL hijacking flaw in the Windows 10 WordPad program to infect computers, using the legitimate program…
The QBot malware operation has started to abuse a DLL hijacking flaw in the Windows 10 WordPad program to infect computers, using the legitimate program…
CISA warned of a recently patched zero-day vulnerability exploited last week to hack into Barracuda Email Security Gateway (ESG) appliances. Barracuda says its security solutions…
The Air Force is asking hackers to take their best shot following the success of Hack the Pentagon and Hack the Army bug bounty challenges.…
Last month, we announced a major improvement to how HackerOne integrates with JIRA. We’re following that up with more good news around making simple cross-platform…
Since its founding, HackerOne has been on a mission to empower the world to build a safer internet. HackerOne helps over 800 diverse organizations collaborate…
Why should I care about bug bounty programs? Every digital company has software vulnerabilities, and they get expensive in case of a breach. The cost…
By Jobert Abma This is part 1 in a series of blog posts on HackerOne’s Triage Services. Triage is critical to any vulnerability disclosure process…
TikTok user data is exposed to Chinese ByteDance employees, a screen recording app goes rogue in Google Play, and privacy groups want Slack to expand…
The Bug Bounty Field Manual is the definitive guide on how to plan, launch, and operate a successful bug bounty program. But 10,283 words is…
According to a report in the German newspaper Handelsblatt, Tesla Inc consumers made over 2,400 complaints about self-acceleration issues and 1,500 complaints about brake problems between…
Hackers, do you have what it takes to hack the U.S. Air Force? Register now to participate in the Department of Defense’s largest bug bounty…
May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of the application development framework…