hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Does GitOps enhance application security?
Medium
Does GitOps enhance application security?
GitOps was pioneered by Weeveworks in 2017. It uses familiar tools to implement continuous deployment for cloud-native applications, improving the developer experience of Kubernetes cluster…
hack and bug bounty
Top 10 Advantages Of Cyber Security In Career
Medium
Top 10 Advantages Of Cyber Security In Career
In the digital age, the significance of cyber security has never been higher. As businesses, governments, and individuals increasingly…
hack and bug bounty
Top 10 Must-Have Burp Suite Extensions for Web Application Security in 2023
Medium
Top 10 Must-Have Burp Suite Extensions for Web Application Security in 2023
Boost your web app security game with these essential Burp Suite extensions. Discover the top 11 tools to supercharge your testing arsenal.
hack and bug bounty
Across Cross-Site Scripting attacks
Medium
Across Cross-Site Scripting attacks
A Comprehensive Guide
hack and bug bounty
X to Get Rid of Ability to Block Accounts, Owner Elon Musk Says
Medium
X to Get Rid of Ability to Block Accounts, Owner Elon Musk Says
As the platform change continues, Musk is presently making his first trip to Japan in more than nine years. Particularly, it has undergone…
hack and bug bounty
Understanding How to Find and Exploit Authentication Vulnerabilities in Web Applications | 2023
Medium
Understanding How to Find and Exploit Authentication Vulnerabilities in Web Applications | 2023
Unveiling the Secrets of Authentication Vulnerabilities in Web Applications | Karthikeyan Nagaraj
hack and bug bounty
Taking a Deep Dive into Ethical Hacking: Hunting Bugs, Not Bounties
Medium
Taking a Deep Dive into Ethical Hacking: Hunting Bugs, Not Bounties
Ethical hacking refers to the practice of intentionally and legally exploiting computer systems, networks, and software applications to…
hack and bug bounty
What are the Most Common Insider Threats to Information Security?
Medium
What are the Most Common Insider Threats to Information Security?
1. Information security relies on three main pillars: People, Process, and Technology. As the landscape of threats, particularly in the…
hack and bug bounty
Transferring Personal Data Outside of the EEA
Medium
Transferring Personal Data Outside of the EEA
The blog focuses on Article 28 of the GDPR, which outlines requirements for data processors in the context of data transfers outside the…
hack and bug bounty
Opening Doors: The Rise of Cybersecurity Careers in India
Medium
Opening Doors: The Rise of Cybersecurity Careers in India
Cybersecurity is a fantastic career choice in India. Strong cybersecurity measures are now essential given the growing digitalization and…
hack and bug bounty
Exploring the World of Cybersecurity: Basic Activities for a Safer Online Experience
Medium
Exploring the World of Cybersecurity: Basic Activities for a Safer Online Experience
Cybersecurity is a vital aspect of our digital age, aiming to safeguard information and systems from unauthorized access or damage. It…
hack and bug bounty
The Ultimate Ethical Hacking Roadmap in 2023 | Careervira.com
Medium
The Ultimate Ethical Hacking Roadmap in 2023
Discover 7 simple steps of how to become an ethical hacker in this blog we’ve got you covered!
hack and bug bounty
Unlocking the Secrets of Ethical Hacking: A Deep Dive into Core Topics
Medium
Unlocking the Secrets of Ethical Hacking: A Deep Dive into Core Topics
Ethical hacking, also known as penetration testing or white-hat hacking, focuses on identifying vulnerabilities in computer systems to…
hack and bug bounty
What is application blacklisting?
Medium
What is application blacklisting?
Application security breaches are one of the most common cyber threats companies face. Malicious actors can use vulnerabilities in one of…
hack and bug bounty
RCE via example DAG in Apache Airflow (CVE-2022–40127) — Exploit
Medium
RCE via example DAG in Apache Airflow (CVE-2022–40127) — Exploit
The provided Python code is an exploit script targeting CVE-2022–40127, a Remote Code Execution (RCE)
hack and bug bounty
How to Hack Android Phones?
Medium
How to Hack Android Phones?
Hii Amigos in today's article we were going to learn how we can hack Android phones
hack and bug bounty
What is DoS/DDoS?
Medium
What is DoS/DDoS?
In this article, we will cover one of the world’s most known cyber attacks: Denial of Service. Before we start boring definitions and…
hack and bug bounty
1st ATO | How I exploited security issue to take over admin account
Medium
1st ATO | How I exploited security issue to take over admin account
Few days ago I came across one bug bounty program of an booking website lets call https://redacted.com which was interesting website with…
hack and bug bounty
Nmap part 1 : Live Host Discovery
Medium
Nmap part 1 : Live Host Discovery
Hello everyone, I hope you all are doing great!
hack and bug bounty
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
Medium
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
Hello everyone, I’m Fares. Today, I’ll share the story of how I successfully identified a reflected XSS vulnerability within a public bug…
hack and bug bounty
Joomla Security: Insights & RCE
Medium
Joomla Security: Insights & RCE
Introduction: