ZERO DAILY
Hacking, AppSec, and Bug Bounty newsletter
2018-02-28 | Alexa Top 1 Million Analysis, Burglary as a service, and How developers got password security so wrong
Wednesday, February 28
TOP STORY
-
Scott Helme published his 6th installment of progress on securing the web over the last 6 months in Alexa Top 1 Million Analysis - February 2018. Read the summary for good high-level updates, one point to highlight: there has been a 32.2% increase in the number of sites redirecting to and enforcing HTTPS in the Alexa Top 1 Million. #maketheinternetsafer
HACKTIVITY
-
myshopify.com domain takeover [27 upvotes] - $1,000 bounty for this report to Shopify by @0xacb.
-
SSRF in https://www.zomato.com████ allows reading local files and website source code [11 upvotes] - $1,000 bounty for this report to Zomato by @nbsp.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
-
Amazon acquires Ring, hopefully no more “burglary as a service”
-
Cloudflare: How Developers got Password Security so Wrong
-
Vulnerability Note VU#475445: Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal
-
Bureaucracy hackers needed to rescue cybersecurity policy
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The first five-figure bounty I got was for a bug I discovered while trying to return some shoes my wife ordered at an online shop.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.