Hacking, AppSec, and Bug Bounty newsletter
2018-06-20 | Attacking Private Networks from the Internet with DNS Rebinding, Red Teamers: Bring Your Own Land, and $30M stolen from Bithumb
Wednesday, June 20
TWEET OF THE DAY
I've started tracking and rating password storages and disclosures. Facebook, Twitter, Dropbox, GitHub and countless others are not afraid to tell us how they store passwords. Let me know if you want to be added too. - @spazef0rze
OTHER ARTICLES WE’RE READING
South Korea based Bitcoin exchange Bithumb taken down and $30M in cryptocurrencies stolen
Living off the Land? FireEye’s Nathan Kirk has some advice for Red Teamers: Bring Your Own Land, developing custom C#-based assemblies with Cobalt Strike (version 3.11).
Symantec reports coordinated Chinese cyber attack successfully breached satellite operators, defense contractors and telecommunications companies in the United States and southeast Asia.
Livestream ever? Speak ever? Kill notifications. Kill them dead. Or be pwned.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: firstname.lastname@example.org
Get this email forwarded to you? Click here to subscribe to the Zero Daily
Each technology goes through a cycle of development and weaponization, followed only later by the formulation of doctrine and occasionally by efforts to control the weapon’s use. The newest technological means of mayhem are cyber, meaning anything involving the electronic transmission of ones and zeros. The development of cyber capabilities has been rapid and is continuing; doctrine is largely yet to be written; and ideas about control are only beginning to emerge.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.