Hacking, AppSec, and Bug Bounty newsletter

2018-05-01 | Anatomy of account takeover attacks, The Dstruction20 CTF at DEFCON, and US Senators chide CFPB on Equifax breach inaction

Tuesday, May 1


  • Distil Networks report: The Anatomy of Account Takeover Attacks on how attackers use bots to test stolen usernames and passwords on websites. Distil evaluated data from 600 domains that include login pages, then analyzed a subset of 100 having the largest bad bot traffic datasets. 100% of websites with login pages face regular attacks and after a major breach, activity increases 3x.


You can see all the latest and greatest disclosures and bounties on  


  • I'm running a CTF at @defcon this year where your hacking rig must cost under $200, and every 15 minutes, a random contestant is chosen to have their machine damaged (usually physically) in a way chosen by rolling a d20: The D(struction)20 CTF! - @dan_crowley



Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.

Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?

Have a news tip / story to highlight? We’d love to hear about it. Email:

Get this email forwarded to you? Click here to subscribe to the Zero Daily

The legislation was inspired, oddly enough, by the 1983 film “WarGames.” … Ronald Reagan saw the film and was terrified, as were other politicians, who vowed to act.

The New Yorker’s Nicholas Shmiddle on the CFAA


HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.