hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Securing Microservices: Application Architecture for Distributed Systems
Medium
Securing Microservices: Application Architecture for Distributed Systems
In today’s digital landscape, businesses are rapidly adopting microservices architecture to build scalable, flexible, and efficient…
hack and bug bounty
Robohelp not Help
Medium
Robohelp not Help
Hi, when I try to found a bug in different platform in Bug Bounty see in this web pages who use Robohelp but this has multiple…
hack and bug bounty
Should I Learn to Code: Meditations and Insights from Top Hackers
Medium
Should I Learn to Code: Meditations and Insights from Top Hackers
In my friend circles, coding can become a tumultuous subject. The immediate image that clouds the mind is techies crowding their favorite…
hack and bug bounty
Hash cracking with a cat! on Windows
Medium
Hash cracking with a cat! on Windows
NOTE: This is not an in-depth tutorial on how to use this tool. I completed this “mini lab” as a part of TCM’s Ethical Hacking course to…
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, August 23, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, August 23, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Streamline dependency updates with Mergify and Snyk
Medium
Streamline dependency updates with Mergify and Snyk
Managing dependencies for a project is a task that requires consistent effort and attention. Surely, you’ve found yourself concerned about any of the following while maintaining a project: Luckily…
hack and bug bounty
Is AI Stupid?
Medium
Is AI Stupid?
In the realm of technological advancement, few goals are as captivating and elusive as achieving Artificial General Intelligence (AGI)…
hack and bug bounty
Penetration Testing: The Shield Against Cyber Threats
Medium
Penetration Testing: The Shield Against Cyber Threats
Learn why penetration tests are important and see popular tools in the industry that can help you finding possible threats in your security
hack and bug bounty
How To Know If A Hacker Is Watching Your Phone
Medium
How To Know If A Hacker Is Watching Your Phone
Introduction
hack and bug bounty
Implications of removing Administrator accounts from AppSec applications
Medium
Implications of removing Administrator accounts from AppSec applications
Administrator accounts in application security applications play a crucial role in managing and securing the application environment. They…
hack and bug bounty
Understanding Lapsus$ Group’s SIM-Swapping Attacks
Medium
Understanding Lapsus$ Group’s SIM-Swapping Attacks
In a striking revelation, the U.S. government has meticulously dissected the labyrinthine strategies employed by the Lapsus$ extortion group to infiltrate a multitude of organizations boasting robust…
hack and bug bounty
Understanding Lapsus$ Group’s SIM-Swapping Attacks
Medium
Understanding Lapsus$ Group’s SIM-Swapping Attacks
In a striking revelation, the U.S. government has meticulously dissected the labyrinthine strategies employed by the Lapsus$ extortion group to infiltrate a multitude of organizations boasting robust…
hack and bug bounty
The Role of Penetration Testing in Appsec
Medium
The Role of Penetration Testing in Appsec
Penetration testing plays an important role in application security by identifying vulnerabilities and weaknesses in applications. It helps…
hack and bug bounty
Setting Up Your Ethical Hacking Lab: Tools and Resources for Beginners
Medium
Setting Up Your Ethical Hacking Lab: Tools and Resources for Beginners
As you embark on your journey to become an ethical hacker, one of the first steps is setting up a dedicated hacking lab. This controlled…
hack and bug bounty
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
Medium
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
An outstanding & thought-provoking podcast on PRIVACY and IoT hacking
hack and bug bounty
Introduction to Ethical Hacking: A Pathway to Cybersecurity Mastery
Medium
Introduction to Ethical Hacking: A Pathway to Cybersecurity Mastery
In the digital age, where technology is shaping neaarly every aspect of our lives, the need for robust cybersecurity has never been more…
hack and bug bounty
The Anatomy of a Robust Penetration Testing Program
Medium
The Anatomy of a Robust Penetration Testing Program
Cybersecurity goes beyond building robust defenses — with the continuous evolution of cyber threats, it becomes crucial to adopt a…
hack and bug bounty
Blog on Types of Hackers.
Medium
Blog on Types of Hackers.
Introduction: In today’s world or digital age the word hacker has become a famous word. Hackers have many skills starting from safeguarding…
hack and bug bounty
Recover Stolen Bitcoin
Medium
Recover Stolen Bitcoin
I’m a victim of the LIQULDOHN cryptocurrency investment scam, I was asked to deposit £700 which I did and it tripled to £2200 within 1 hour. That got my interest, The next deposit was £3,500 and my…
hack and bug bounty
Unveiling Cryptographic Hashes: From Security Shields to Hash Cracking Adventure
Medium
Unveiling Cryptographic Hashes: From Security Shields to Hash Cracking Adventure
hack and bug bounty
PCI DSS Remediation and Implementation
Medium
PCI DSS Remediation and Implementation
PCI remediation is a crucial undertaking for any organization aiming to achieve full PCI compliance with the 12 technical and operational…