What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Hacking, AppSec, and Bug Bounty newsletter
Monday, March 4
Google's Project Zero detailed macOS kernel flaw: Issue 1726: XNU: copy-on-write behavior bypass via mount of user-owned filesystem image. Patch inbound most likely, a bit of a controversial release timing.
OTHER ARTICLES WE’RE READING
Windows Exploit Suggestor authored by Arris Huijgen
Amazing feat by @try_to_hack, first hacker to reach $1M in payouts on HackerOne, @mlitchfield was close behind.
Lukasz Olejnik discusses the U.S. effort to counter Russian election interference during the midterms.
David Sopas bought a $20 smart lock on Amazon, what happens next won’t surprise you...
We published a thing: The 2019 Hacker Report
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
People who freak out without threat modeling are often over-rating new risks and under-rating old ones.
Reduce your company’s risk of security vulnerabilities and tap into the world’s largest community of security hackers. Contact us today to see which program is the right fit.