hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Entering Cybersecurity
Medium
Entering Cybersecurity
Hey buddies I am Athang Gangad from India…I am very happy/excited to tell you that I am going to start my cyber security journey from…
hack and bug bounty
Bir enerji şirketinin çalışan paneline erişme serüvenim | BugBountyTips
Medium
Bir enerji şirketinin çalışan paneline erişme serüvenim | BugBountyTips
Bu yazımda sizlere, bir bugbounty programında karşılaştığım bazı yöntemleri göstereceğim ve nasıl şirket paneline eriştiğimi anlatacağım…
hack and bug bounty
HTB — Driver | 58/100
Medium
HTB — Driver | 58/100
Howdy! I’m back at it, this time working on the HackTheBox machine Driver. This was a super fun box for me! While definitely on the easier…
hack and bug bounty
X and Au10tix: The Rise of Biometric Verification Amidst Privacy Concerns
Medium
X and Au10tix: The Rise of Biometric Verification Amidst Privacy Concerns
TL;DR: In the face of rising online impersonation, X (formerly Twitter) introduces a biometric-based identification system in collaboration…
hack and bug bounty
Elon Musk changed the name Twitter into X
Medium
Elon Musk changed the name Twitter into X
Am I the only person in the world, who thinks …
hack and bug bounty
Cryptographic Foundations: Strengthening Application Security Architecture
Medium
Cryptographic Foundations: Strengthening Application Security Architecture
In today’s interconnected digital landscape, the importance of security in software applications cannot be overstated. As technology…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 21, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 21, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Trying Harder: PNPT Exam Review
Medium
Trying Harder: PNPT Exam Review
I’ve been a bit of a certification junkie over the last few years. In this blog I’ll be reviewing my experience with the Practical Network…
hack and bug bounty
Main current development dependencies that we must keep up to date and secure
Medium
Main current development dependencies that we must keep up to date and secure
We know that several components are used during the development of a web application, however, it is always necessary to keep them updated…
hack and bug bounty
OSINT: Annoying Spam Message Investigation
Medium
OSINT: Annoying Spam Message Investigation
Use every opportunity to sharpen your investigative skills.
hack and bug bounty
Zero-Day Vulnerabilities: The Ongoing Challenge in Cybersecurity Resilience
Medium
Zero-Day Vulnerabilities: The Ongoing Challenge in Cybersecurity Resilience
Welcome to the world of zero-day vulnerabilities. In the realm of cybersecurity, these elusive threats are like hidden traps waiting to be…
hack and bug bounty
Does GitOps enhance application security?
Medium
Does GitOps enhance application security?
GitOps was pioneered by Weeveworks in 2017. It uses familiar tools to implement continuous deployment for cloud-native applications, improving the developer experience of Kubernetes cluster…
hack and bug bounty
Top 10 Advantages Of Cyber Security In Career
Medium
Top 10 Advantages Of Cyber Security In Career
In the digital age, the significance of cyber security has never been higher. As businesses, governments, and individuals increasingly…
hack and bug bounty
Top 10 Must-Have Burp Suite Extensions for Web Application Security in 2023
Medium
Top 10 Must-Have Burp Suite Extensions for Web Application Security in 2023
Boost your web app security game with these essential Burp Suite extensions. Discover the top 11 tools to supercharge your testing arsenal.
hack and bug bounty
Across Cross-Site Scripting attacks
Medium
Across Cross-Site Scripting attacks
A Comprehensive Guide
hack and bug bounty
X to Get Rid of Ability to Block Accounts, Owner Elon Musk Says
Medium
X to Get Rid of Ability to Block Accounts, Owner Elon Musk Says
As the platform change continues, Musk is presently making his first trip to Japan in more than nine years. Particularly, it has undergone…
hack and bug bounty
Understanding How to Find and Exploit Authentication Vulnerabilities in Web Applications | 2023
Medium
Understanding How to Find and Exploit Authentication Vulnerabilities in Web Applications | 2023
Unveiling the Secrets of Authentication Vulnerabilities in Web Applications | Karthikeyan Nagaraj
hack and bug bounty
Taking a Deep Dive into Ethical Hacking: Hunting Bugs, Not Bounties
Medium
Taking a Deep Dive into Ethical Hacking: Hunting Bugs, Not Bounties
Ethical hacking refers to the practice of intentionally and legally exploiting computer systems, networks, and software applications to…
hack and bug bounty
What are the Most Common Insider Threats to Information Security?
Medium
What are the Most Common Insider Threats to Information Security?
1. Information security relies on three main pillars: People, Process, and Technology. As the landscape of threats, particularly in the…
hack and bug bounty
Transferring Personal Data Outside of the EEA
Medium
Transferring Personal Data Outside of the EEA
The blog focuses on Article 28 of the GDPR, which outlines requirements for data processors in the context of data transfers outside the…
hack and bug bounty
Opening Doors: The Rise of Cybersecurity Careers in India
Medium
Opening Doors: The Rise of Cybersecurity Careers in India
Cybersecurity is a fantastic career choice in India. Strong cybersecurity measures are now essential given the growing digitalization and…