Wednesday, May 2
TOP STORY
Slack open sourced goSDL, their Security Development Lifecycle tool, including declining in-the-wild vulns as a KPI.
HACKTIVITY
Potential to abuse pricing errors in saved carts [11 upvotes] - $1,000 bounty for this report to Shopify by @richardf.
Improper access control on adding a Register to an Outlet [5 upvotes] - no bounty for this report to Vend by @al88nsk.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
Weak: password
Strong: 1VeryL0ngPa$$phraseLikeThis1
Protect your information with passwords that combine numbers, symbols, and multiple words. - @applesupport
OTHER ARTICLES WE’RE READING
CVE-2018-8840 vulnerability in Schneider Electric products – InduSoft Web Studio and InTouch Machine Edition discovered by Tenable. More from Threatpost.
ZDNet’s Charlie Osborne takes an in-depth look at the culprit behind Ukraine's power grid blackout
Woops. GitHub has said a bug exposed some user passwords -- in plaintext
8 graphs on why cities are bad at cybersecurity. No surprise the volume of attacks is rising.
FireEye report on the rise of new APTs: no longer just from the usual culprits
Two Windows tools: Windows command reference and a pentesters guide to Windows hashes
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The more time that goes by and the more deeply I give it thought, the more convinced I am that the web is held together with sticky tape. No - cyber-sticky tape!
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.