Image Exposure Management Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks July 5, 2022 MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the... Read Now
Image 5 Security Stages of the DevSecOps Pipeline June 28, 2022 5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains... Read Now
Image Crowdsourced Security PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage July 29, 2022 PayPal has been partnering with the hacker community since launching a bug bounty program in... Read Now
Image DevSecOps vs DevOps: What is the Difference? June 23, 2022 In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what... Read Now
Image Exposure Management How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours June 16, 2022 When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we... Read Now
Image The Most Overlooked Server Permission Checks June 23, 2022 We previously looked at common server authentication issues we see in code review and offered... Read Now
Image Exposure Management HackerOne’s In-Depth Approach to Vulnerability Triage and Validation March 14, 2024 Not all VDP triage teams and workflows are created equal. Learn how HackerOne approaches vulnerability triage and validation. Read Now
Image Hacker's Health: Adverse Effects of Doomscrolling June 27, 2022 Question: "I spend the majority of my time researching and keeping up with current affairs... Read Now
Image The Top 5 Most Common Security Issues I Discover When Reviewing Code June 10, 2022 NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real... Read Now
Image Exposure Management CISOs: Do You Know the Security Risks of Your Organization's Next M&A? June 14, 2022 First, I will discuss the inherent risks associated with M&As as attack surfaces grow. A... Read Now