hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Don’t Use a VPN…it’s not the ultimate security fix you’ve been told
Medium
Don’t Use a VPN…it’s not the ultimate security fix you’ve been told
“A VPN can help protect your personal data from hackers trying to steal it. However, it’s essential to know the legitimate reasons for…
hack and bug bounty
Google Pays Apple $15,000 for Bug Find
Medium
Google Pays Apple $15,000 for Bug Find
According to Forbes, Google has verified that Apple's Security Engineering and Architecture team discovered a high-severity security…
hack and bug bounty
The role of AI in Cybersecurity
Medium
The role of AI in Cybersecurity
AI, or Artificial Intelligence, plays a crucial role in enhancing cybersecurity defenses and mitigating cyber threats. Here are the various ways in which AI revolutionizes cybersecurity: 1. Threat…
hack and bug bounty
Top 5 Cyber Security Certification 2023
Medium
Top 5 Cyber Security Certification 2023
Cybersecurity is a popular career option in the IT industry, but it’s not easy to land a job in this field. To increase your chances, you…
hack and bug bounty
Cybersecurity incidents like this can be concerning.
Medium
Cybersecurity incidents like this can be concerning.
Citrix vpn vulnerability
hack and bug bounty
THM — Corridor | 38/100
Medium
THM — Corridor | 38/100
Hi! Today I’m working on the Easy rated box Corridor from TryHackMe. This was a very simple and quick box highlighting IDOR…
hack and bug bounty
from shodan to interesting django misconfiguration
Medium
from shodan to interesting django misconfiguration
hi guys i hope you catching some bugs and earning some cash
hack and bug bounty
Ransomware Rampage: A Digital Heist Odyssey
Medium
Ransomware Rampage: A Digital Heist Odyssey
hack and bug bounty
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Medium
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Discover the Thrilling World of Ethical Hacking — Turn Your Skills into Lucrative Opportunities!
hack and bug bounty
Web Application Exploits: Information Leakage and Improper Error Handling
Medium
Web Application Exploits: Information Leakage and Improper Error Handling
Introduction
hack and bug bounty
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
Medium
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
In this daily crypto price analysis, we will delve into the recent performance of some of the most prominent coins in the market. Today’s…
hack and bug bounty
HTB — Timelapse | 39/100
Medium
HTB — Timelapse | 39/100
Hi! Back at it with another CTF writeup, this time featuring Timelapse from HackTheBox. This was an Easy rated Active Directory box that…
hack and bug bounty
SBOM output automation
Medium
SBOM output automation
SBOM tools can automatically generate SBOMs in various formats as part of a continuous integration/continuous deployment (CI/CD) pipeline…
hack and bug bounty
How i hacked around 300 with Details
Medium
How i hacked around 300 with Details
lot of criticizing a people so I decided to make a complete tutorial about it the how our i was able to hack more than 300 website and use…
hack and bug bounty
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
Medium
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
As a defense contractor, you're likely familiar with the Department of Defense's (DoD) guidelines for the training, certification, and management of its cybersecurity workforce. Over the years, these…
hack and bug bounty
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
Medium
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
EternalBlue is one of the most infamous cybersecurity vulnerabilities known today. This article will explore the details of this flaw, its…
hack and bug bounty
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
Medium
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
“Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software” is published by SimeonOnSecurity.
hack and bug bounty
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
Medium
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
“Secure Python Coding: Avoiding Unsafe Functions for Robust Applications” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Decentralization: How to Set Up a Presearch Node
Medium
Mastering Decentralization: How to Set Up a Presearch Node
“Mastering Decentralization: How to Set Up a Presearch Node” is published by SimeonOnSecurity.
hack and bug bounty
Building Scalable and Secure User Management with AWS Cognito and Node.js
Medium
Building Scalable and Secure User Management with AWS Cognito and Node.js
Introduction: