mierau/hotline: A modern Hotline client for Mac, iOS, and iPadOS
2025-02-06 02:01:00 github.com An attempt to resurrect Hotline for modern Apple systems (iOS, macOS, etc) by completely recreating it in ...
2025-02-06 02:01:00 github.com An attempt to resurrect Hotline for modern Apple systems (iOS, macOS, etc) by completely recreating it in ...
johnk 2019-10-25 12:49:00 www.hackerone.com Customers tell us that a big difference between hacker-powered security and traditional approaches is the impact. ...
johnk 2019-10-28 19:00:00 www.hackerone.com Each blog in the series "Breaking Down the Benefits of Hacker-Powered Pentests" has focused on one ...
2025-02-07 11:46:00 www.sciencealert.com In May 2024, an epic solar storm rattled Earth so powerfully that its effects were felt even ...
johnk 2019-10-31 20:00:00 www.hackerone.com Phil Venables, senior advisor and board director at Goldman Sachs, has seen more than his share ...
johnk 2019-11-01 16:45:00 www.hackerone.com Phil Venables, senior advisor and board director at Goldman Sachs, has seen more than his share ...
johnk 2019-11-06 17:00:00 www.hackerone.com Building a small company’s security team is a unique challenge. Budgets are tight. Hiring is difficult. ...
johnk 2019-11-07 19:00:00 www.hackerone.com This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped ...
johnk 2019-11-11 14:15:00 www.hackerone.com Data breaches can cost millions in damages and fines and have a devastating impact on customer ...
johnk 2019-11-14 09:55:00 www.hackerone.com As our customers’ security teams grow, it’s important for us to sustain their growth with new ...
Aman Mishra 2025-02-07 11:14:00 gbhackers.com A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services (IIS) ...
Aman Mishra 2025-02-07 08:13:00 gbhackers.com Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like ...
2025-02-07 07:33:00 theconversation.com All known human languages display a surprising pattern: the most frequent word in a language is twice ...
Aman Mishra 2025-02-07 04:55:00 gbhackers.com Cybercriminals are actively exploiting vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software to infiltrate ...
johnk 2019-11-20 17:00:00 www.hackerone.com This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped ...
johnk 2019-11-21 19:00:00 www.hackerone.com HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected ...
johnk 2019-12-13 18:30:00 www.hackerone.com It’s that time of the year again. Time to dig out your wrinkled “No, I can’t ...
johnk 2020-01-27 13:00:00 www.hackerone.com Egyptian bug bounty hunter, Ahmed Sherif a.k.a @Batee5a, is the first hacker to be named InnoGames’ Most ...
HackerOne 2020-02-03 18:00:00 www.hackerone.com Hello hackers! Thanks to all of you who participated in our #h1415 CTF! We had a lot ...
2025-02-06 13:40:00 github.com A small GUI application built in redbean that lets you explore your SQLite databases "page by page" ...
Jessica Sexton 2020-05-11 19:00:00 www.hackerone.com On February 21st, almost 70 hackers participated in HackerOne’s first Flagship Live Hacking Event of ...
Aman Mishra 2025-02-06 04:02:00 gbhackers.com A sophisticated malware campaign, dubbed “FatBoyPanel,” has been uncovered by cybersecurity researchers, targeting users of ...
johnk 2020-06-05 12:00:00 www.hackerone.com Hackers represent a global force for good, coming together to help address the growing security needs ...
johnk 2020-06-12 10:00:00 www.hackerone.com Hello hackers! Thanks to all of you who participated in our #h1-2006 CTF! We had a lot of ...
Aman Mishra 2025-02-06 04:04:00 gbhackers.com In a concerning development, the North Korean-backed hacking group Kimsuky has intensified its use of ...
johnk 2020-06-12 12:00:00 www.hackerone.com @cache-money comes from a software engineering background and later switched to security engineering. After a year ...