The Right Amount of Trauma
I’ve come to believe that there’s an ideal amount of trauma in one’s past. Or at least if you aim to be highly successful at…
I’ve come to believe that there’s an ideal amount of trauma in one’s past. Or at least if you aim to be highly successful at…
Data centre managers face a growing number of challenges such as the increasing dependence on cloud-based remote networks for increasing levels of business operation, especially…
Five years ago, Shopify’s small but mighty security team began their hacker-powered security journey with HackerOne. Since then, they have paid out over $1,000,000 in…
WordPress version 4.9.3 included a great deal of security patches. However, the widely used Content Management System accidentally disabled the auto update functionality in that…
On February 21st, almost 70 hackers participated in HackerOne’s first Flagship Live Hacking Event of the year: h1-415 2020. This is HackerOne’s fourth year hosting…
“My whole life is circling around IT security,” Kristian Bremberg says, half-jokingly. The Community Manager of Detectify’s ethical hacking platform Detectify Crowdsource is passionate about…
This blog post was written and contributed by Information Security Engineer, Ray Duran, on behalf of the PayPal Bug Bounty team. PayPal has been a…
Gerben Janssen van Doorn, a 21-year old ethical hacker from The Netherlands, is one of our Detectify Crowdsource hackers. He smiles when asked about his…
Vulnerabilities that go undetected can pose a serious threat to your business. Identifying critical bugs is only the first step in reducing such risk. As…
A thorough website security check can reveal vulnerabilities in your code and help you fix them before they are exploited by hackers. This step-by-step guide…
Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship and smuggle information about the…
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large commercial entities.” The Cactus ransomware…