All posts in ethical hackers

by Sally Adam Keren Elazari is a cybersecurity analyst and senior researcher at the Tel Aviv University Interdisciplinary Cyber Research Center. She focuses on hackers and technology, and their social implications. Keren believes, just like Neo in The Matrix, that the cybersecurity industry is facing a simple choice. Keep doing . . . Read more
30 Dec, 2020
Amazon Prime Day, bug bounty program, Bugcrowd, Casey Ellis, Cloud Security, COVID-19, Cybersecurity, ethical hackers, Hacks, holiday shopping, InfoSec Insider, Mobile Security, neighborhood watch, online retailers, retail cybersecurity, Security News, Vulnerabilities, Vulnerability Disclosure, Web Security
0
Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers.
29 Oct, 2020
Apple, bounty payouts, Bug Bounty, COVID-19, Cross Site Scripting, ethical hackers, flaws, HackerOne, information disclosure, Most Recent ThreatLists, most valuable, most-rewarded, Security, Security News, stay at home orders, tiktok, top 10, Vulnerabilities, XSS
0

The most-rewarded flaw is XSS, which is among those that are relatively cheap for organizations to identify. Cross-site scripting (XSS) remained the most impactful vulnerability and thus the one reaping the highest rewards for ethical hackers in 2020 for a second year running, according to a list of top 10 . . . Read more
16 Oct, 2020
Android, Apple, Bug Bounty, Critical flaws, Developers, ethical hackers, HackerOne, Hackers, Oracle, Security, Security News, tiktok, Vulnerabilities, Wal-Mart, Web Security
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
09 Oct, 2020
$300, 000, Apple, Apple Bug Bounty Program, Applications, authentication bypass, Bug Bounty, Cloud Security, critical bugs, Critical flaws, Developers, ethical hackers, Hackers, Hacks, hardware, iCloud, IoT, Mobile Security, Privacy, sam curry, Security News, software, source code, takeover, three-month hack, Vulnerabilities, Web Security, wormable, XSS
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.