hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Uncovering a Vulnerability in Intercom Widget Chat Configuration
Medium
Uncovering a Vulnerability in Intercom Widget Chat Configuration
Hello Hackers ! In this article, we’ll explore a significant security flaw that lurks within the widely-used Intercom chat widget, a…
hack and bug bounty
The Power of Penetration Testing: Assessing and Enhancing Security
Medium
The Power of Penetration Testing: Assessing and Enhancing Security
In the ever-evolving landscape of cybersecurity, small businesses often find themselves as prime targets for cyberattacks. These…
hack and bug bounty
“The Cybersecurity Skills Gap Bridging the Divide in the Industry”
Medium
“The Cybersecurity Skills Gap Bridging the Divide in the Industry”
In the digital age, the importance of cybersecurity cannot be overstated. With the rise of cyber threats and the ever-increasing volume and…
hack and bug bounty
“Protecting Critical Infrastructure Cybersecurity’s Vital Role”
Medium
“Protecting Critical Infrastructure Cybersecurity’s Vital Role”
In an increasingly digitized world, the critical infrastructure that supports our daily lives has become heavily reliant on interconnected…
hack and bug bounty
Mastering DevOps: A Step-by-Step Introduction
Medium
Mastering DevOps: A Step-by-Step Introduction
What is DevOps?
hack and bug bounty
Breaking Barriers: Unmasking the Easy Password Validation Bypass in Security Key Registration |…
Medium
Breaking Barriers: Unmasking the Easy Password Validation Bypass in Security Key Registration | How a Dumb Frontend Led to 750…
Dumb Frontend and response manipulation
hack and bug bounty
“The Ethics of AI Navigating the Moral Quandaries”
Medium
“The Ethics of AI Navigating the Moral Quandaries”
Artificial Intelligence (AI) is an ever-expanding realm of technological innovation that has the power to transform our world in profound…
hack and bug bounty
“AI in Healthcare Revolutionizing Patient Care"
Medium
“AI in Healthcare Revolutionizing Patient Care"
The healthcare industry is experiencing a transformative revolution, and at the heart of this evolution lies the integration of artificial…
hack and bug bounty
$1800 Bounty: Exploiting Unpredictable Data that Leads to All Users PII Exposure in an IDOR…
Medium
$1800 Bounty: Exploiting Unpredictable Data that Leads to All Users PII Exposure in an IDOR…
Introduction
hack and bug bounty
̀ …
Medium
𝙉𝙚𝙨𝙨𝙪𝙣𝙤 𝙨𝙩𝙧𝙪𝙢𝙚𝙣𝙩𝙤 𝙥𝙪𝙤̀ 𝙨𝙤𝙨𝙩𝙞𝙩𝙪𝙞𝙧𝙚 𝙡𝙖 𝙘𝙤𝙣𝙨𝙖𝙥𝙚𝙫𝙤𝙡𝙚𝙯𝙯𝙖…
La sicurezza informatica è una delle sfide più importanti dell’era digitale in cui viviamo. Con sempre più dati sensibili e informazioni…
hack and bug bounty
Exploring the World of Ethical Hacking: Unveiling RPCScan
Medium
Exploring the World of Ethical Hacking: Unveiling RPCScan
Introduction
hack and bug bounty
Unveiling the Secrets of Enum4linux: A Powerful Tool in Ethical Hacking
Medium
Unveiling the Secrets of Enum4linux: A Powerful Tool in Ethical Hacking
Introduction
hack and bug bounty
HTB: Starting Point — Sequel Machine
Medium
HTB: Starting Point — Sequel Machine
Penetration Test Report
hack and bug bounty
AppSec Tales XXI | NoSQLI
Medium
AppSec Tales XXI | NoSQLI
Application Security Testing for NoSQL Injections.
hack and bug bounty
ELON MUSK IS A HORSE’S ASS
Medium
ELON MUSK IS A HORSE’S ASS
X is the Medium for Morons
hack and bug bounty
HTTP Host header Attacks in Web App Penetration Testing | 2023
Medium
HTTP Host header Attacks in Web App Penetration Testing | 2023
In this section, we’ll explain what Host Header Attack is, describe some types, explain how to find and exploit Host Header Attack and…
hack and bug bounty
X formerly Twitter — Apple App Reviews
Medium
X formerly Twitter — Apple App Reviews
How would you rate X?
hack and bug bounty
X與AI,值千金
Medium
X與AI,值千金
【科技探知】Elon Musk酷愛字母「X」,該符號在我們X世代中的確蠻酷,X像是打叉體現了對權威的拒絕 ,是神秘也是反叛,新X教授馬斯克在接手twitter後進行了大刀闊斧改變。其中最為人詫異的就是將twitter經典「藍鳥」Logo也改為他衷愛的「X」。
hack and bug bounty
X’s New Features: ‘Similar Posts’ and ‘Dissimilar Posts’ to Break Information Bubbles
Medium
X’s New Features: ‘Similar Posts’ and ‘Dissimilar Posts’ to Break Information Bubbles
The social media giant known as X, or Twitter, has introduced an innovative feature to enhance our online experience. With the launch of…
hack and bug bounty
Reconnaissance: The Cornerstone of Effective Pentesting
Medium
Reconnaissance: The Cornerstone of Effective Pentesting
In numerous real-world instances such as the attacks by Lockbit ransomeware Group, the power of reconnaissance in successful cyberattacks…
hack and bug bounty
Day 10: Bug Bounty (Pay Your Tuitions)
Medium
Day 10: Bug Bounty (Pay Your Tuitions)
As we embark on the 10th day of my 100 Days of Cybersecurity Challenge, I’ve got an exciting prospect to share with you — a way to…