hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Decathlon allie PenTesting et Bug Bounty pour blinder ses applications
LeMagIT
Decathlon allie PenTesting et Bug Bounty pour blinder ses applicati...
Marque extrêmement visible dans le monde, Decathlon a pris le virage du digital depuis quelques années. Pour s’assurer du niveau de sécurité de ses sites et de ses applications, l’enseigne a fait l...
hack and bug bounty
«Il faut 800 millions d’euros pour faire passer les start-up cyber françaises à l’échelle», estime Jean-Noël de Galzain, PDG de Wallix
www.usinenouvelle.com
«Il faut 800 millions d'euros pour faire passer les start-up cyber françaises à l'échelle», estime Jean-Noël de Galzain, PDG de…
PDG de Wallix, fleuron de la cybersécurité tricolore, Jean-Noël de Galzain dirige l'axe cybersécurité du comité stratégique de la...-Cybersécurité
hack and bug bounty
How the future of cyber crime could involve fake voice messages from loved ones
The National
How the future of cyber crime could involve fake voice messages from loved ones
Gisec Global conference in Dubai hears of the evolving threats to cyber security as criminals adapt to advanced AI tools
hack and bug bounty
Guillaume Vassault-Houlière, CEO de YesWeHack, « Une cyberattaque peut conduire à fermer une société »
bigmedia.bpifrance.fr
Guillaume Vassault-Houlière, CEO de YesWeHack, « Une cyberattaque peut conduire à fermer une société »
Enjeu majeur de la digitalisation des entreprises et des services publics, la cybersécurité est devenue une question centrale avec la multiplication des cyberattaques. Guillaume Vassault-Houlière, le co-fondateur et CEO de YesWeHack, nous livre sa vision…
hack and bug bounty
Bug Bounty Radar // The latest bug bounty programs for March 2023
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
hack and bug bounty
ChatGPT a aidé des hackers éthiques à dénicher une faille et gagner 20’000 dollars
www.ictjournal.ch
ChatGPT a aidé des hackers éthiques à dénicher une faille et gagner 20’000 dollars
Des participants à une campagne de Bug Bounty ont remporté une prime avec le soutien de ChatGPT. Ils ont ainsi montré que l’IA générative peut être utile aux hackers éthiques.
hack and bug bounty
Practical Security Recommendations for Start-ups with Limited Budgets
Alex Chapman’s Blog
Practical Security Recommendations for Start-ups with Limited Budgets
Hi, my name is Alex, I’ve been an IT security professional since 2007 and I’ve recently entered the start-up world with my project bughuntr.io. In putting together this project, security has been a primary concern for me. This is both due to my background…
hack and bug bounty
GitLab AMA - Bug Bounty with Alex Chapman
hack and bug bounty
Bugcrowd Big Bugs: BitBucket Pipelines Kata Containers Build Container Escape
Alex Chapman’s Blog
BitBucket Pipelines Kata Containers Virtual Machine Escape
Atlassian ran a project on Bugcrowd looking for bugs in their proposed implementation of Kata Containers within the BitBucket Pipelines CI/CD environment. Whilst participating in this project, I identified a vulnerability in Kata Containers which could allow…
hack and bug bounty
Daily Swig - Container security: Privilege escalation bug patched in Docker Engine
hack and bug bounty
Moby - Access to remapped root allows privilege escalation to real root
hack and bug bounty
Kata Containers `hostPath` file write
hack and bug bounty
Privileged Container Escape - Control Groups release_agent
hack and bug bounty
Kata Containers - Improper file permissions for read-only volumes
hack and bug bounty
GitLab - GitLab-Runner on Windows `DOCKER_AUTH_CONFIG` container host Command Injection
hack and bug bounty
Ticket Fraud Scammers - An Investigation
ZephrSec - Adventures In Information Security
Ticket Fraud Scammers - An Investigation
If you're reading this, it's a blog post that's not my regular write-up but more of an investigation and a hypothesis on the anatomy of a scam. I also put it together to raise awareness for those who read my blog and who might not be overtly technical-focused.
hack and bug bounty
LTR102 - Published Finally!
ZephrSec - Adventures In Information Security
LTR102 - Published Finally!
Hello Everyone,
This a short blog post to announce I have finally published my second book after several years of work. I have spent nearly five writing it; like my first one, it follows the path of getting into and progressing in the industry, while LTR101…
hack and bug bounty
BYODC - Bring Your Own Domain Controller
ZephrSec - Adventures In Information Security
BYODC - Bring Your Own Domain Controller
BYODC or bring your own domain controller is a post-exploitation technique and another option for performing a DCSync in a more opsec safe manner.
hack and bug bounty
Multiple Paths to Compromise An Environment
ZephrSec - Adventures In Information Security
Multiple Paths to Compromise An Environment
Attack paths and compromising systems are something we, as attackers, thrive in. Many areas of system weakness can be attacked and leveraged to gain a foothold or an upper hand within an environment.
hack and bug bounty
Burp Suite Enterprise Edition Power Tools: Unleashing the power to the command line, Python, and more
PortSwigger Blog
Burp Suite Enterprise Edition Power Tools: Unleashing the power to the command line, Python, and more
tl;dr We have released BSEEPT - Burp Suite Enterprise Edition Power Tools which: Is a command line tool to drive all aspects of the BSEE GraphQL API. Is a Python client library to allow you to easily