• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Thursday, June 19, 2025
Techcratic
  • TC
  • AI
    Artificial Intelligence

    INRFlow: Flow Matching for INRs in Ambient Space

    Artificial Intelligence

    Building a custom text-to-SQL agent using Amazon Bedrock and Converse API

    Artificial Intelligence

    How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner

    Artificial Intelligence

    Automatically Build AI Workflows with Magical AI

    Artificial Intelligence

    Amazon Nova Lite enables Bito to offer a free tier option for its AI-powered code reviews

    Artificial Intelligence

    Bridging the Gap: New Datasets Push Recommender Research Toward Real-World Scale

    Artificial Intelligence

    7 Python Errors That Are Actually Features

    Artificial Intelligence

    10 Awesome OCR Models for 2025

    Artificial Intelligence

    5 Error Handling Patterns in Python (Beyond Try-Except)

  • Crypto
    Crypto Firms on Wall Street Diverge: Miners Dip, Strategy Clones Vary

    Crypto Firms on Wall Street Diverge: Miners Dip, Strategy Clones Vary

    Bitcoin Volume Metric Hints A ‘$130k-$135k Btc Will Happen’ By Q3 2025

    Bitcoin Volume Metric Hints A ‘$130k-$135k Btc Will Happen’ By Q3 2025

    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    DOGE, SOL, and XRP Holders Can Now Cash Out Through BCC Mining

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    Bitcoin Bull Cycle is Over: CryptoQuant CEO

    Trump Wants GENIUS Bill Sent Straight to His Desk, Without Delay

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    Uniswap Surges 24% on $88B Volume, Targeting $12

    Chinese Bitcoin Hardware Titans Hold 95% Market, Shift to US

  • Cybersecurity
    Cybersecurity

    Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Cybersecurity

    FedRAMP at Startup Speed: Lessons Learned

    Cybersecurity

    CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

    Cybersecurity

    Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

    Cybersecurity

    Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Cybersecurity

    Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

    Cybersecurity

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Cybersecurity

    How to Address the Expanding Security Risk

    Cybersecurity

    ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

  • Deals
    Mushkin MLB5C600AEEM16GX2 Mem 2*16gmushkin Mlb5c600aeem16gx2

    Mushkin MLB5C600AEEM16GX2 Mem 2*16gmushkin Mlb5c600aeem16gx2

    MSI MAG321CUP 32-inch 3840 x 2160 (UHD), VA, 4K Gaming Monitor 160Hz, Adaptive Sync,…

    MSI MAG321CUP 32-inch 3840 x 2160 (UHD), VA, 4K Gaming Monitor 160Hz, Adaptive Sync,…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

  • Gaming
    The Legend of Zelda: Breath of the Wild – Shee Venath Shrine Walkthrough [HD 1080P]

    The Legend of Zelda: Breath of the Wild – Shee Venath Shrine Walkthrough [HD 1080P]

    Legend of Zelda: Breath of the Wild Walkthrough Day1 (No commentary)

    Legend of Zelda: Breath of the Wild Walkthrough Day1 (No commentary)

    [3DS] Zelda Ocarina of Time 3D Walkthrough Part 11 Adult Link!

    [3DS] Zelda Ocarina of Time 3D Walkthrough Part 11 Adult Link!

    Steam adds more accessibility features and Valve says it’s just the start, wants players with disabilities to provide more feedback and suggestions

    Steam adds more accessibility features and Valve says it’s just the start, wants players with disabilities to provide more feedback and suggestions

    Super Mario Bros. (1993) | Film Review

    Super Mario Bros. (1993) | Film Review

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 24/78 – Mask of Truth Part 1 (Commentary)

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 24/78 – Mask of Truth Part 1 (Commentary)

    Legend of Zelda: Breath of the Wild preview walkthrough on Nintendo Switch, Part 1

    Legend of Zelda: Breath of the Wild preview walkthrough on Nintendo Switch, Part 1

    Microsoft’s exciting multi-year silicon partnership with AMD doesn’t actually make it clearer if there’s an official Xbox handheld or next-gen console coming

    Microsoft’s exciting multi-year silicon partnership with AMD doesn’t actually make it clearer if there’s an official Xbox handheld or next-gen console coming

    mayata shrine

    mayata shrine

  • Tesla
    OEDRO Floor Mats Fit for Tesla Model 3 Highland 2024 2025, All Weather Waterproof…

    OEDRO Floor Mats Fit for Tesla Model 3 Highland 2024 2025, All Weather Waterproof…

    2025 Upgraded Tesla Model Y Roof Sunshade Heat-Insulating, UV-Protective,…

    2025 Upgraded Tesla Model Y Roof Sunshade Heat-Insulating, UV-Protective,…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

  • UFO
    The Fermi Paradox: Where Are All the Aliens? #aliens #cosmos #cosmicmysteries #extraterrestrial

    The Fermi Paradox: Where Are All the Aliens? #aliens #cosmos #cosmicmysteries #extraterrestrial

    Lightweight Cotton Beanie, Summer Skull Caps, Breathable Thin Sleep Hats for Running Cycling Hiking Fishing

    Lightweight Cotton Beanie, Summer Skull Caps, Breathable Thin Sleep Hats for Running Cycling Hiking Fishing

    A Glitch In The Matrix Caught On Camera At Disneyland #shorts

    A Glitch In The Matrix Caught On Camera At Disneyland #shorts

    Men’s Short Sleeve Workout Shirts Quick Dry Lightweight T-Shirts Gym Running Athletic Tshirt for Summer

    Men’s Short Sleeve Workout Shirts Quick Dry Lightweight T-Shirts Gym Running Athletic Tshirt for Summer

    Unveiling the Truth: Garry Nolan’s Journey in #UFO Research | Dr. Garry Nolan

    Unveiling the Truth: Garry Nolan’s Journey in #UFO Research | Dr. Garry Nolan

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

No Result
View All Result
  • TC
  • AI
    Artificial Intelligence

    INRFlow: Flow Matching for INRs in Ambient Space

    Artificial Intelligence

    Building a custom text-to-SQL agent using Amazon Bedrock and Converse API

    Artificial Intelligence

    How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner

    Artificial Intelligence

    Automatically Build AI Workflows with Magical AI

    Artificial Intelligence

    Amazon Nova Lite enables Bito to offer a free tier option for its AI-powered code reviews

    Artificial Intelligence

    Bridging the Gap: New Datasets Push Recommender Research Toward Real-World Scale

    Artificial Intelligence

    7 Python Errors That Are Actually Features

    Artificial Intelligence

    10 Awesome OCR Models for 2025

    Artificial Intelligence

    5 Error Handling Patterns in Python (Beyond Try-Except)

  • Crypto
    Crypto Firms on Wall Street Diverge: Miners Dip, Strategy Clones Vary

    Crypto Firms on Wall Street Diverge: Miners Dip, Strategy Clones Vary

    Bitcoin Volume Metric Hints A ‘$130k-$135k Btc Will Happen’ By Q3 2025

    Bitcoin Volume Metric Hints A ‘$130k-$135k Btc Will Happen’ By Q3 2025

    Best Presales to Buy Today – Which Coins Are Poised for a Breakout?

    DOGE, SOL, and XRP Holders Can Now Cash Out Through BCC Mining

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    China’s Central Bank Governor Envisions the End of US Dollar Dominance

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    K33 Plans Major Bitcoin Acquisition With $8 Million Share Issue

    Bitcoin Bull Cycle is Over: CryptoQuant CEO

    Trump Wants GENIUS Bill Sent Straight to His Desk, Without Delay

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    Ripple and SEC Press Judge Torres to Approve Settlement Ending XRP Case

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    The World’s Most Dangerous Bond? Analyst Sounds the Alarm on Japan’s 40-Year JGB Market

    Uniswap Surges 24% on $88B Volume, Targeting $12

    Chinese Bitcoin Hardware Titans Hold 95% Market, Shift to US

  • Cybersecurity
    Cybersecurity

    Meta Adds Passkey Login Support to Facebook for Android and iOS Users

    Cybersecurity

    FedRAMP at Startup Speed: Lessons Learned

    Cybersecurity

    CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

    Cybersecurity

    Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

    Cybersecurity

    Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Cybersecurity

    Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

    Cybersecurity

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Cybersecurity

    How to Address the Expanding Security Risk

    Cybersecurity

    ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

  • Deals
    Mushkin MLB5C600AEEM16GX2 Mem 2*16gmushkin Mlb5c600aeem16gx2

    Mushkin MLB5C600AEEM16GX2 Mem 2*16gmushkin Mlb5c600aeem16gx2

    MSI MAG321CUP 32-inch 3840 x 2160 (UHD), VA, 4K Gaming Monitor 160Hz, Adaptive Sync,…

    MSI MAG321CUP 32-inch 3840 x 2160 (UHD), VA, 4K Gaming Monitor 160Hz, Adaptive Sync,…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Logitech C920x HD Pro Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Lexar 128GB (2-Pack) Professional 1667x SD Card, UHS-II, C10, U3, V60, Full HD, 4K, Up…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Charger for Lenovo Laptop – Ideapad 3 1 5 S340 S145 330 320 310, Flex 5, V14 V15 V17,…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Kingston 240GB A400 SATA 3 2.5″ Internal SSD SA400S37/240G – HDD Replacement for…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    Intel Core i7-12700K Gaming Desktop Processor with Integrated Graphics and 12 (8P+4E)…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    EVGA 24G-P5-3975-KR GeForce RTX 3090 XC3 Ultra Gaming, 24GB GDDR6X, iCX3 Cooling, ARGB…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

    CORSAIR VENGEANCE LPX DDR4 RAM 64GB (2x32GB) 3600MHz CL18-22-22-42 1.35V Intel AMD…

  • Gaming
    The Legend of Zelda: Breath of the Wild – Shee Venath Shrine Walkthrough [HD 1080P]

    The Legend of Zelda: Breath of the Wild – Shee Venath Shrine Walkthrough [HD 1080P]

    Legend of Zelda: Breath of the Wild Walkthrough Day1 (No commentary)

    Legend of Zelda: Breath of the Wild Walkthrough Day1 (No commentary)

    [3DS] Zelda Ocarina of Time 3D Walkthrough Part 11 Adult Link!

    [3DS] Zelda Ocarina of Time 3D Walkthrough Part 11 Adult Link!

    Steam adds more accessibility features and Valve says it’s just the start, wants players with disabilities to provide more feedback and suggestions

    Steam adds more accessibility features and Valve says it’s just the start, wants players with disabilities to provide more feedback and suggestions

    Super Mario Bros. (1993) | Film Review

    Super Mario Bros. (1993) | Film Review

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 24/78 – Mask of Truth Part 1 (Commentary)

    Zelda Ocarina of Time 3D 100% Walkthrough – Part 24/78 – Mask of Truth Part 1 (Commentary)

    Legend of Zelda: Breath of the Wild preview walkthrough on Nintendo Switch, Part 1

    Legend of Zelda: Breath of the Wild preview walkthrough on Nintendo Switch, Part 1

    Microsoft’s exciting multi-year silicon partnership with AMD doesn’t actually make it clearer if there’s an official Xbox handheld or next-gen console coming

    Microsoft’s exciting multi-year silicon partnership with AMD doesn’t actually make it clearer if there’s an official Xbox handheld or next-gen console coming

    mayata shrine

    mayata shrine

  • Tesla
    OEDRO Floor Mats Fit for Tesla Model 3 Highland 2024 2025, All Weather Waterproof…

    OEDRO Floor Mats Fit for Tesla Model 3 Highland 2024 2025, All Weather Waterproof…

    2025 Upgraded Tesla Model Y Roof Sunshade Heat-Insulating, UV-Protective,…

    2025 Upgraded Tesla Model Y Roof Sunshade Heat-Insulating, UV-Protective,…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    BestEvMod Center Console Cup Holder Trim Cover Panel Decorative Cover Sticker ABS…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    TUFFIOM 46″x 36″x 6″ Universal Rooftop Cargo Carrier Basket, Heavy Duty Steel Roof Rack…

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    Door Side Rear View Mirror Cover Compatible with 2024 2025 Tesla Cybertruck Accessories

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    4PCS Wheel Center Caps and 24PCS Black Lug nut Covers for Tesla Cybertruck Accessories…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Car Windshield Cleaning Tool, Microfiber Window Cleaner with 4 Washable and Reusable…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Rear Under Seat Storage Truck Tool Box Organizer for Tesla Cybertruck 2024 2025…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

    Fast Tesla Charger Level 2 25FT- 40A Portable Mobile EV Charger for Tesla, Wireless…

  • UFO
    The Fermi Paradox: Where Are All the Aliens? #aliens #cosmos #cosmicmysteries #extraterrestrial

    The Fermi Paradox: Where Are All the Aliens? #aliens #cosmos #cosmicmysteries #extraterrestrial

    Lightweight Cotton Beanie, Summer Skull Caps, Breathable Thin Sleep Hats for Running Cycling Hiking Fishing

    Lightweight Cotton Beanie, Summer Skull Caps, Breathable Thin Sleep Hats for Running Cycling Hiking Fishing

    A Glitch In The Matrix Caught On Camera At Disneyland #shorts

    A Glitch In The Matrix Caught On Camera At Disneyland #shorts

    Men’s Short Sleeve Workout Shirts Quick Dry Lightweight T-Shirts Gym Running Athletic Tshirt for Summer

    Men’s Short Sleeve Workout Shirts Quick Dry Lightweight T-Shirts Gym Running Athletic Tshirt for Summer

    Unveiling the Truth: Garry Nolan’s Journey in #UFO Research | Dr. Garry Nolan

    Unveiling the Truth: Garry Nolan’s Journey in #UFO Research | Dr. Garry Nolan

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Dimzmars Spacecraft Model Interstellar Prowler Movie Spaceship Model

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Scientists Reveal New Mission to Locate Alien Technology Within Our Solar System

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Womens Mens Running Shoes Tennis Sneakers Lightweight Gym Slip on Unisex Shoes Athletic Workout Walking Shoes

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

    Sacred Ark Contains Secret Alien Tech | Ancient Aliens | The UnXplained Zone #shorts

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

What Is It & How to Remediate

Hacker News by Hacker News
January 25, 2025
in Hacker News
Reading Time: 6 mins read
123 7
A A
0

Sandeep Singh
2024-11-06 12:21:00
www.hackerone.com

HackerOne’s 8th Annual Hacker-Powered Security Report states that improper access control is the second most common vulnerability reported in a bug bounty and number three reported in pentests. It makes up 9% of all vulnerability types discovered on the HackerOne platform.

Despite being considered a “low-hanging fruit” vulnerability type, improper access control can significantly impact an organization, including data breaches and theft, system disruption, third-party risk, financial damages, and legal/compliance repercussions.

Let’s look more closely at improper access control — what it is, how it’s used, and how to remediate it.

What Is Improper Access Control?

Access controls are the security measures that control access to a system, its data, and its user permissions. They define who can access what. These measures fit into three categories:

  • Authentication: Proving the identity of a user.
  • Authorization: Confirming a user should be allowed to access specific data or resources.
  • Auditing: Tracking and logging what actions the user has taken.

Improper access control refers to issues that arise when restrictions on access to a system or data are not properly implemented, allowing unauthorized access. Improper access control can manifest in many different ways, including:

  • Access rules that are too permissive, allowing access beyond what is needed for legitimate purposes
  • Lack of authentication requirements, allowing anyone access without verifying identity
  • Insecure default configurations that allow more access than intended
  • Failure to restrict access based on roles, allowing lower-level users access to privileged functions
  • Not properly revoking access when no longer needed, allowing former employees/users to obtain access to systems still

The key aspect is that improper access controls create vulnerabilities by allowing unauthorized users to access systems or data they should not have access to based on policy. Proper access controls should follow the principle of least privilege, be restrictive in granting access, and be careful about revocation.

Business Impact of Improper Access Control

  1. Data breaches and theft: Unauthorized access can lead to malicious actors accessing and stealing sensitive data like customer information, trade secrets, financial data, or intellectual property. This can cause significant financial, legal, and reputational damages.
  2. System disruption: Improper access enables compromise of critical systems. Malicious actors can launch ransomware, delete or corrupt data, or disrupt operations — hampering productivity and capabilities.
  3. Regulatory non-compliance: Regulations such as HIPAA, PCI-DSS, and NIST require strong access controls. Failure to meet compliance can result in heavy fines and loss of certifications needed to operate.
  4. Privilege abuse: Overly permissive access enables insider threats where employees/users misuse elevated privileges to compromise security for personal gain. This results in fraud or sabotage.
  5. Third-party risk: Poor access controls around external party access like vendors and partners enable these external threats to compromise security and increase risk surface.

What Industries Are Impacted By Improper Access Control?

Improper access control issues do not discriminate by industry. However, it is more prominent in some industries than others. The chart below illustrates the top vulnerabilities across the HackerOne platform by industry. Improper access control only makes up 5% of vulnerabilities identified in the Government space, yet it makes up a massive 13% in Internet and Online Services. Government agencies are highly regulated when it comes to access and the protection of sensitive data. On the other hand, Internet and Online Services organizations have extensive web presences that make it challenging to manage access, so they see more low-hanging fruit vulnerabilities that have yet to be identified and remediated by their internal security teams.

Look at how many of your vulnerabilities are improper access control compared to the average for your industry.

Security vulnerability types by industry

A Real-world Example of an Improper Access Control Vulnerability 

HackerOne’s Hacktivity resource showcases disclosed vulnerabilities on the HackerOne Platform. Check it out to see how specific weaknesses have been identified and fixed. The following improper access control example demonstrates how a hacker discovered a vulnerability in KAYAK that could allow an attacker to take over any account logged into the organization’s Android application.

Customer: KAYAK
Vulnerability: Improper Access Control
Severity: Critical

Summary

While researching zero-day vulnerabilities in mobile applications, the ethical hacker @retr02332 found it was possible to steal a user’s session cookie through a malicious deeplink in KAYAK v161.1. With a one-click attack, an unauthenticated, remote attacker could steal the account of any victim logged into the KAYAK mobile app for Android.

KAYAK code with improper access control

Impact

The hacker demonstrated that crafting a specific deeplink with the victim’s email address can allow an attacker to gain access to the victim’s KAYAK account in one click without any authentication. They showed the following steps to reproduce the exploit:

  1. Craft the following deeplink with the victim’s email address: kayak://login?email=victim@email.com
  2. Send the deeplink to the victim and trick them into clicking on it.
  3. The deeplink will automatically log the attacker into the victim’s Kayak account in the Android app without any authentication.

This allows an attacker to gain unauthorized access to the victim’s KAYAK account, view their personal information, and perform account actions as the victim.

Remediation

An initial patch was made available via the Google Play Store the day after the finding was reported to KAYAK. Thankfully, the vulnerability was introduced only very recently prior to its discovery, and the security team at KAYAK determined that it has been exploited.

In general, implementing controls focused on granting minimal necessary access, enforcing checks and balances, requiring multi-factor authentication, and user education are all key for preventing and remediating improper access control vulnerabilities.

Secure Your Organization From Improper Access Control With HackerOne

This is only one example of the pervasiveness and impact severity of an improper access control vulnerability. HackerOne and our community of ethical hackers are the best equipped to help organizations identify and remediate improper access control and other vulnerabilities, whether through bug bounty, Pentest as a Service (PTaaS), Code Security Audit, or other solutions by considering the attacker’s mindset on discovering a vulnerability.

Download the 8th Annual Hacker-Powered Security Report to learn more about the impact of the top 10 HackerOne vulnerabilities, or contact HackerOne to get started taking on improper access control at your organization.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Start your free Amazon Prime trial
today and unlock unlimited streaming and more!

Support Techcratic

If you find value in Techcratic’s insights and articles, consider supporting us with Bitcoin. Your support helps me, as a solo operator, continue delivering high-quality content while managing all the technical aspects, from server maintenance to blog writing, future updates, and improvements. Support Innovation! Thank you.

Bitcoin Address:

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Please verify this address before sending funds.

Bitcoin QR Code

Simply scan the QR code below to support Techcratic.

Bitcoin QR code for donations

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162ShareTweet101
Previous Post

I was wrong about the Samsung Galaxy S25 Ultra

Next Post

Cat videos for cats to watch /Cat sounds to attract cats / Relaxing music for cats

Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

Curved-Crease Sculpture by Erik and Martin Demaine
Hacker News

Curved-Crease Sculpture by Erik and Martin Demaine

June 19, 2025
1.3k
elliptic-curves.art
Hacker News

elliptic-curves.art

June 19, 2025
1.3k
lunchbox-computer/bento: a computer in a keyboard
Hacker News

lunchbox-computer/bento: a computer in a keyboard

June 18, 2025
1.3k
Framework Laptop 12 review: I’m excited to see what the 2nd generation looks like
Hacker News

Framework Laptop 12 review: I’m excited to see what the 2nd generation looks like

June 18, 2025
1.3k
montyanderson/incant: Add magic spells to your code.
Hacker News

montyanderson/incant: Add magic spells to your code.

June 18, 2025
1.3k
SparcLab/OpenSERDES: Digitally synthesizable architecture for SerDes using Skywater Open PDK 130 nm technology.
Hacker News

SparcLab/OpenSERDES: Digitally synthesizable architecture for SerDes using Skywater Open PDK 130 nm technology.

June 18, 2025
1.3k
bgreenwell/lstr: A fast, minimalist directory tree viewer, written in Rust.
Hacker News

bgreenwell/lstr: A fast, minimalist directory tree viewer, written in Rust.

June 17, 2025
1.3k
Time Series Forecasting with Graph Transformers
Hacker News

Time Series Forecasting with Graph Transformers

June 17, 2025
1.3k
Load More
Next Post
Cat videos for cats to watch /Cat sounds to attract cats / Relaxing music for cats

Cat videos for cats to watch /Cat sounds to attract cats / Relaxing music for cats

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Techcratic – Your All In One Tech Hub © 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired