hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Password Entropy: What it is and Why it Matters…
Medium
Password Entropy: What it is and Why it Matters…
TL;DR:
hack and bug bounty
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
Medium
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
In the digital age, where much of our personal and financial information resides online, we face an ever-present threat known as phishing…
hack and bug bounty
Top 5 Security Resources for 2023–9–30
Medium
Top 5 Security Resources for 2023–9–30
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
How companies prevent our personal data getting leaked
Medium
How companies prevent our personal data getting leaked
Preventing the leakage of personal data is a critical concern for companies in today’s digital age, given the increasing frequency and…
hack and bug bounty
The Dark Side of IPv6: Countering MITM6 Attacks
Medium
The Dark Side of IPv6: Countering MITM6 Attacks
Hey there, tech-savvy ByteBusters!
hack and bug bounty
Impostor Syndrome Struggle: Casting Off the Mask
Medium
Impostor Syndrome Struggle: Casting Off the Mask
The Struggle Is Real:
hack and bug bounty
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Medium
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Creating a cybersecurity roadmap is a strategic plan to protect your organization’s digital assets. Here’s a simplified guide:
hack and bug bounty
You can add extra zeroes. XSS bypass on a private bug bounty program
Medium
You can add extra zeroes. XSS bypass on a private bug bounty program
Hi incredible hackers. I got a private invite, and got curious about the program, so I signed up into the main website and started clicking…
hack and bug bounty
API Security — Overview
Medium
API Security — Overview
API security is vital to ensuring that your apps and backend services are not compromised.
hack and bug bounty
Goodbye Twitter, err “X.” An Open Letter to My Followers
Medium
Goodbye Twitter, err “X.” An Open Letter to My Followers
“Over the past ten years, this platform has been my canvas, where I’ve painted my thoughts freely. It’s been an incredible journey, growing…
hack and bug bounty
Read online Soldier X by Don L. Wulffson
Medium
Read online Soldier X by Don L. Wulffson
Review Soldier X by Don L Wulffson
hack and bug bounty
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Medium
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Hi everyone, I hope you are doing well. It’s been a while since I last published an article about my findings. In this article, I will…
hack and bug bounty
API Security Program Metrics
Medium
API Security Program Metrics
Several metrics are important to an API security program, including:
hack and bug bounty
API Güvenliği için SSL Pinning Yeterli Mi?
Medium
API Güvenliği için SSL Pinning Yeterli Mi?
Mobile uygulamalar bazında API güvenliğini sağlamak için kullanılan SSL ve SSL Pinning aşılması zor bir güvenlik sağlıyor mu?
hack and bug bounty
Advanced Penetration Testing Course in Delhi
Medium
Advanced Penetration Testing Course in Delhi
Penetration testing is an essential skill in the world of cybersecurity. It allows security professionals to simulate cyber-attacks on…
hack and bug bounty
what is an application security engineer?
Medium
what is an application security engineer?
If you are interested in becoming an application security engineer, you can start by earning a bachelor’s degree in cybersecurity and…
hack and bug bounty
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
Medium
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
ABOUT THE STORY
hack and bug bounty
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
Medium
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
“takeown.exe” (Takes ownership of a file) is a PE binary located at “%windir%\System32\takeown.exe”. It is a CLI tool which allows an…
hack and bug bounty
Writeups for Damn Vulnerable Web Application (DVWA)
Medium
Writeups for Damn Vulnerable Web Application (DVWA)
DVWA Writeups
hack and bug bounty
October is here… The Cybersecurity Awareness Month
Medium
October is here… The Cybersecurity Awareness Month
In today's world, where our lives are increasingly shaped by technology, there's a pressing need for us all to become more aware of the…