Decoding the Characteristics of Modern Pentesting: Value Read more about Decoding the Characteristics of Modern Pentesting: ValueLet's explore the "Value" factor of different pentesting methodologies and see how each one measures up.
Pre-Pentest Checklist Part 1: Essential Questions to Answer Before Your Next Pentest Read more about Pre-Pentest Checklist Part 1: Essential Questions to Answer Before Your Next PentestExplore the foundational aspects of pentesting—focusing on 12 questions that answer the "what" and "why" of pentesting.
XZ Utils CVE-2024-3094: A Tale of Broken Trust, Curious Persistence, and a Call to Action Read more about XZ Utils CVE-2024-3094: A Tale of Broken Trust, Curious Persistence, and a Call to ActionLearn about a backdoor vulnerability, its impacts, and the importance of securing open source.
Recap: Experts Break Down AI Red Teaming in a Live Q&A Read more about Recap: Experts Break Down AI Red Teaming in a Live Q&AThree HackerOne AI specialists shared their insights about AI red teaming and the impact of AI safety, security, and innovation.
Vulnerability Disclosure Policy Requirements for UK Smart Products Read more about Vulnerability Disclosure Policy Requirements for UK Smart ProductsNew security regulations for connected devices and related guidance enter into force in the UK at the end of April.
How an Information Disclosure Vulnerability Led to Critical Data Exposure Read more about How an Information Disclosure Vulnerability Led to Critical Data ExposureA deep dive into the pervasiveness of information disclosure, and how one vulnerability led to critical data exposure.
Decoding the Characteristics of Modern Pentesting: Effectiveness Read more about Decoding the Characteristics of Modern Pentesting: EffectivenessHackerOne pentest experts explore the "Effectiveness" factor of pentesting methods to see how each security testing alternative measures up.
AI Safety vs. AI Security Read more about AI Safety vs. AI SecurityWhat's the difference between AI safety and AI security — and is AI Red Teaming the solution for both?
Shift Left is Dead: A Post Mortem Read more about Shift Left is Dead: A Post MortemShift left is dead. What now?
NCSC Recognises The Work Of Ethical Hackers With An Appreciation Event Read more about NCSC Recognises The Work Of Ethical Hackers With An Appreciation EventThe NCSC recognized the work of ethical hackers in its VRS program with an appreciation event.