What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Hacking, AppSec, and Bug Bounty newsletter
Tuesday, February 12
Trend Micro found EXE files in the wild delivering a malicious payload that overrides Mac’s built-in protection mechanisms such as Gatekeeper.
OTHER ARTICLES WE’RE READING
PwnDefend, a #CTF where you have to find the targets online using @shodanhq or similar tools
US State Georgia is one of 5 states to only do electronic voting. The saga of their troubles continues reports Politico
CVE-2019-5736: New vulnerability in runc allows container escape, root-level code execution in Docker
Atlantic Council’s recommendations on what to do about 5G security
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
I have a account with that site, all the email in my account was deleted.
VFEmail user John Senchak
Reduce your company’s risk of security vulnerabilities and tap into the world’s largest community of security hackers. Contact us today to see which program is the right fit.