hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Cyber Briefing: 2023.11.08
Medium
Cyber Briefing: 2023.11.08
👉
What’s trending in cybersecurity today?
hack and bug bounty
How to Get Free Cyber Security Experience from Top Companies
Medium
How to Get Free Cyber Security Experience from Top Companies
If you’re struggling to land your first cyber security role because companies are asking for so much experience that you don’t have, there…
hack and bug bounty
Navigating Cloud and Application Security: Insights from the Gartner Security and Risk Management…
Medium
Navigating Cloud and Application Security: Insights from the Gartner Security and Risk Management Summit
At the recent Gartner Security and Risk Management Summit in London, executives and business technologists converged to tackle the…
hack and bug bounty
TryHackMe ‑ Basic Pentesting Room Writeup
Medium
TryHackMe ‑ Basic Pentesting Room Writeup
Challenge description: This challenge helps you apply basic enumeration and privilege escalation techniques to network protocols, as well…
hack and bug bounty
When Collaboration Becomes Vulnerable: Exposing SQL Injection
Medium
When Collaboration Becomes Vulnerable: Exposing SQL Injection
In an era where collaboration is key to business agility, a popular document collaboration tool had its security compromised.
hack and bug bounty
Me, Myself & I
Medium
Me, Myself & I
Get to know me better
hack and bug bounty
Deep Diving into CVE-2023–46298: Resource Exhaustion in Next.js
Medium
Deep Diving into CVE-2023–46298: Resource Exhaustion in Next.js
Hi Everyone, today I will do a bit of a different blog, which will be about my research on CVE-2023–46298, which was classified by Snyk as…
hack and bug bounty
The Empty Promise of a JavaScript “Bypass”: A Developer’s Perspective
Medium
The Empty Promise of a JavaScript “Bypass”: A Developer’s Perspective
I recently encountered an interesting sales pitch that caught my attention, not for its ingenuity, but for its bold inaccuracy. I was…
hack and bug bounty
Grok: The AI Chatbot That Can Access X
Medium
Grok: The AI Chatbot That Can Access X
Grok is a new AI chatbot that can converse with users on various topics using xAI’s proprietary “Grok” model. What makes Grok stand out…
hack and bug bounty
Monitor Your Loved One’s Instagram Account During Your Travels
Medium
Monitor Your Loved One’s Instagram Account During Your Travels
Traveling is a wonderful experience, but it can be challenging to be away from your loved ones for an extended period. In today’s digital…
hack and bug bounty
The Hidden Cost Of Ignoring Human Psychology In Cyber Security
Medium
The Hidden Cost Of Ignoring Human Psychology In Cyber Security
And why the ‘best’ options are not always best
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 3/25
Medium
Project 2510: Bug Bounty Challenge — Day 3/25
Greetings, Welcome to Day 3.
hack and bug bounty
Introducing Zerosecurity.org: Your Premier Destination for Information Security News
Medium
Introducing Zerosecurity.org: Your Premier Destination for Information Security News
Zerosecurity.org, a prominent name in the world of cybersecurity, stands as a beacon of knowledge and protection in the digital age. For years, we have been at the forefront of delivering essential…
hack and bug bounty
What’s new in CVSS 4.0
Medium
What’s new in CVSS 4.0
In this blog post, we will highlight Snyk’s view on the new vulnerability scoring framework, CVSS 4.0, which was released on November 1, 2023. The revised framework emerges as an inherent progression…
hack and bug bounty
Dark Art of SEO Poisoning
Medium
Dark Art of SEO Poisoning
SEO poisoning, a devious and stealthy strategy used by cybercriminals to deceive search engines and harm unsuspecting internet users.
hack and bug bounty
GootBot — bespoke tool to evade post exploitation detections
Medium
GootBot — bespoke tool to evade post exploitation detections
Gootloader has historically served as an initial access malware, but GootBot represents a significant change in post-infection TTPs, as it…
hack and bug bounty
HTB Keeper Walkthrough
Medium
HTB Keeper Walkthrough
Reconnaissance
hack and bug bounty
Discovering Hidden Treasures: 60 Google Dorks to Supercharge Your Bug Bounty Hunt
Medium
Discovering Hidden Treasures: 60 Google Dorks to Supercharge Your Bug Bounty Hunt
Enhance Your Bug Bounty Skills with These Powerful Google Dorks
hack and bug bounty
INFOSECPREP WALKTHROUGH PLAYING GROUNDS
Medium
INFOSECPREP WALKTHROUGH PLAYING GROUNDS
1)RECONNAISSANCE
hack and bug bounty
Threat Modeling: Everything You Need to Know for Web Application Security
Medium
Threat Modeling: Everything You Need to Know for Web Application Security
Web applications are a crucial part of today’s online landscape, with businesses relying on them to provide services to their customers…