hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
More secure Facebook Canvas Part 2: More Account Takeovers
hack and bug bounty
More secure Facebook Canvas Part 2: More Account Takeovers
hack and bug bounty
Multiple bugs allowed malicious Android Applications to takeover Facebook/Workplace accounts
hack and bug bounty
Multiple bugs allowed malicious Android Applications to takeover Facebook/Workplace accounts
hack and bug bounty
More secure Facebook Canvas : Tale of $126k worth of bugs that lead to Facebook Account Takeovers
hack and bug bounty
More secure Facebook Canvas : Tale of $126k worth of bugs that lead to Facebook Account Takeovers
hack and bug bounty
Oversightboard.com site-wide CSRF due to missing checking
hack and bug bounty
Oversightboard.com site-wide CSRF due to missing checking
hack and bug bounty
Disclose unconfirmed email/phone of a Facebook user
hack and bug bounty
Disclose unconfirmed email/phone of a Facebook user
hack and bug bounty
Oculus SSO “Account Linking” bug leads to account takeover on third party websites and inside VR Games/Apps
hack and bug bounty
Oculus SSO “Account Linking” bug leads to account takeover on third party websites and inside VR Games/Apps
hack and bug bounty
Building a case for bug bounty programs: Addressing corporate concerns
hack and bug bounty
Revolutionizing healthcare security: moving beyond pentesting
hack and bug bounty
Meet the hacker: HG_Real
hack and bug bounty
Announcing Intigriti’s Brinqa Integration
hack and bug bounty
Aggressive scanning in bug bounty (and how to avoid it)
Intigriti
Aggressive scanning in bug bounty (and how to avoid it)
What is excessive scanning / intrusive testing? How can you avoid it? Learn about the importance of adhering to program requirements and the rules of engagement in bug bounty. In this article, we'll configure and test some common web hacking tools to ensure…
hack and bug bounty
Why SaaS businesses need to rethink their penetration testing approach
Intigriti
SaaS businesses need to rethink their penetration testing approach
Traditional penetration testing for SaaS businesses is falling short. Learn how organizations can level up with ongoing testing.
hack and bug bounty
Testing static websites and uncovering hidden security vulnerabilities
Intigriti
Testing static websites and uncovering hidden security vulnerabilities
By not conducting tests on the static websites of your targets, you may be overlooking numerous potential vulnerabilities. In today’s post, we will go through the top 3 most common ways of finding sec...
hack and bug bounty
Modernizing pentesting: strategies for leisure and hospitality