How a GraphQL Bug Resulted in Authentication Bypass
Haoxi Tan 2024-07-29 17:00:00 www.hackerone.com What Is an Authentication Bypass Vulnerability?An authentication bypass vulnerability is a weakness in a system ...
Haoxi Tan 2024-07-29 17:00:00 www.hackerone.com What Is an Authentication Bypass Vulnerability?An authentication bypass vulnerability is a weakness in a system ...
Caroline Collins 2024-07-30 17:00:00 www.hackerone.com Our Solution: Precision Internal Network Testing with Zero Trust ControlWe are excited to introduce Gateway Internal ...
Martijn Russchen 2024-08-08 17:49:00 www.hackerone.com Enter HackerOne's AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding ...
Martijn Russchen 2024-08-28 17:41:00 www.hackerone.com The Communication Challenge in CybersecurityThe vulnerability management process involves various stakeholders, each with their own ...
HackerOne 2024-09-04 17:49:00 www.hackerone.com HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% ...
Alyona Vysotska 2024-09-16 17:00:00 www.hackerone.com Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks ...
Spencer Chin 2024-09-30 12:42:00 www.hackerone.com Pentesting has been around for decades, but it hasn’t undergone the revolution that other security ...
2025-01-25 14:02:00 iamwillwang.com Every HTML Element There are over a hundred HTML elements. This page uses all of them. You're ...
2025-01-25 15:19:00 outsidetext.substack.com “Anomalous”, “glitch”, or “unspeakable” tokens in an LLM are those that induce bizarre behavior or otherwise don’t ...
2025-01-25 19:50:00 lwn.net Benefits for LWN subscribers The primary benefit from subscribing to LWN is helping to keep us publishing, ...
mwoolslayer@hackerone.com 2024-10-14 18:33:00 www.hackerone.com To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has ...
mwoolslayer@hackerone.com 2024-10-28 18:55:00 www.hackerone.com Security researchers and election technology manufacturers at the Election Security Research Forum (ESRF).The EventIn preparation for ...
Sandeep Singh 2024-11-01 12:57:00 www.hackerone.com It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious ...
Sandeep Singh 2024-11-04 12:50:00 www.hackerone.com According to HackerOne’s 8th Annual Hacker-Powered Security Report, XSS is the number one most common ...
Sandeep Singh 2024-11-05 12:00:00 www.hackerone.com HackerOne’s 8th Annual Hacker-Powered Security Report states that information disclosure is the third most common vulnerability ...
Sandeep Singh 2024-11-06 12:21:00 www.hackerone.com HackerOne’s 8th Annual Hacker-Powered Security Report states that improper access control is the second most common ...
debbie@hackerone.com 2024-11-13 19:13:00 www.hackerone.com Employees had the chance to connect over shared goals and values, fostering stronger relationships beyond the ...
HackerOne 2024-11-15 12:20:00 www.hackerone.com Integrating AI into SOCsThe integration of AI into security operations centers (SOCs) and its impact on ...
Robert Coleman 2024-11-15 13:12:00 www.hackerone.com What is HAQL?Back in 2022, we were faced with a challenge: we wanted to build ...
Marina Briones 2024-11-19 20:15:00 www.hackerone.com This year, we launched new initiatives designed to bring people together in fun and innovative ...
2025-01-24 20:38:00 www.androidauthority.com Edgar Cervantes / Android AuthorityTL;DR YouTube users are experiencing extremely long, unskippable ads, sometimes up to an ...
Josh Jacobson 2024-12-02 16:30:00 www.hackerone.com 1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug ...
2025-01-24 14:27:00 www.sandordargo.com C++11 introduced parameter packs to provide a safer way to pass an undefined number of parameters to ...
Divya 2025-01-24 07:48:00 gbhackers.com A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave vulnerability, ...
2025-01-24 11:40:00 sebastianmihai.com Welcome to the pages of Snowdrop OS, my homebrew operating system project. Snowdrop OS was born of ...
Aman Mishra 2025-01-24 09:24:00 gbhackers.com In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague ...