hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Writing High-Quality Bug Reports: Best Practices for Effective Bug Bounty Hunting
Medium
Writing High-Quality Bug Reports: Best Practices for Effective Bug Bounty Hunting
Bug reporting is not just about identifying vulnerabilities; it’s a skill that bridges the gap between security researchers and developers…
hack and bug bounty
User role controlled by request parameter: A portswigger lab’s Report
Medium
User role controlled by request parameter: A portswigger lab’s Report
Access the lab from the link on the website and login with the given credentials.
hack and bug bounty
Surfing the Web Safely: Your Ultimate Guide to Secure Browsing
Medium
Surfing the Web Safely: Your Ultimate Guide to Secure Browsing
HomeSecurity Tips Surfing the Web Safely: Your Ultimate Guide to Secure Browsing
hack and bug bounty
Twitter/X advertisements dwindle, meanwhile Elon Musk tells advertisers: ‘Go f**k yourself’
Medium
Twitter/X advertisements dwindle, meanwhile Elon Musk tells advertisers: ‘Go f**k yourself’
How very mature, and not totally childish.
hack and bug bounty
“The Silent Threat Cybersecurity Risks in Telecommunications Infrastructure”
Medium
“The Silent Threat Cybersecurity Risks in Telecommunications Infrastructure”
In the interconnected world of global communication, where telecommunications infrastructure forms the backbone of connectivity, the silent…
hack and bug bounty
“Securing the Smart City Cyber Threats to Urban Infrastructure”
Medium
“Securing the Smart City Cyber Threats to Urban Infrastructure”
In the age of smart cities, where urban landscapes are intertwined with digital technologies to enhance efficiency and sustainability, the…
hack and bug bounty
“Flight Plan Cybersecurity Concerns in Aviation Infrastructure”
Medium
“Flight Plan Cybersecurity Concerns in Aviation Infrastructure”
In an era where global connectivity and technological advancements shape the aviation industry, the integration of digital systems into…
hack and bug bounty
“Nuclear Security in the Digital Age Defending Critical Infrastructure”
Medium
“Nuclear Security in the Digital Age Defending Critical Infrastructure”
In the digital age, where connectivity and automation drive efficiency, the security of critical infrastructure, especially nuclear…
hack and bug bounty
Announcing IWCON 2023 Speakers Final Batch
Medium
Announcing IWCON 2023 Speakers Final Batch
Register today to be a part of the coolest Cybersecurity conference and end 2023 on a bang!
hack and bug bounty
PENETRATION TEST OR SECURITY EVALUATION GUIDE:
Medium
PENETRATION TEST OR SECURITY EVALUATION GUIDE:
ENUMERATION:
hack and bug bounty
API Security Market | Increasing Demand for Efficient Management Practices Report 2032
Medium
API Security Market | Increasing Demand for Efficient Management Practices Report 2032
The global API security market is projected to experience remarkable growth, with an annual growth rate of approximately 26.3% from 2022 to…
hack and bug bounty
How attackers use ARP Spoofing / Poisoning to takeover a complete Network!
Medium
How attackers use ARP Spoofing / Poisoning to takeover a complete Network!
!!!Disclaimer Only for Education Purposes and for Training Purposes!!!
hack and bug bounty
Building Kubernetes Detections: Strengthening Security with Real-world Examples
Medium
Building Kubernetes Detections: Strengthening Security with Real-world Examples
Kubernetes has revolutionized container orchestration, enabling the seamless deployment and scaling of containerized applications. However…
hack and bug bounty
Verification Bypass via “Mass Assignment”
Medium
Verification Bypass via “Mass Assignment”
السلام عليكم
hack and bug bounty
How attackers use ARP Spoofing / Poisoning to takeover a complete Network!!
Medium
How attackers use ARP Spoofing / Poisoning to takeover a complete Network!!
!!!Disclaimer Only for Education Purposes and for Training Purposes!!!
hack and bug bounty
5+All Security Resource Digest for 2023–12–1
Medium
5+All Security Resource Digest for 2023–12–1
Browse these and all resources added in the last day in my personal security resource database, the SSD, for free at Go.StrykerNoStriking.com/Complete-DB. To search and use any resource record from…
hack and bug bounty
DAV: Tryhackme
Medium
DAV: Tryhackme
Dav is a nice room from the Library on Tryhackme and it is part of our cybersecurity training. boot2root machine for FIT and bsides…
hack and bug bounty
Hackers vs. Ethical Hackers: The Good and Bad Guys of the Digital World
Medium
Hackers vs. Ethical Hackers: The Good and Bad Guys of the Digital World
The two sides to the coin, choose wisely
hack and bug bounty
Elon Musk Receives Mass Resignation From X Employees; Here’s Why
Medium
Elon Musk Receives Mass Resignation From X Employees; Here’s Why
Elon Musk finds it difficult to keep up with X’s workflow. He’s having a lot of trouble keeping up with the job at X. Advertisers have…
hack and bug bounty
Hack the Box — Devvortex — Seasonal Machine
Medium
Hack the Box — Devvortex — Seasonal Machine
Welcome back. Hope you all are doing good.