What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Hacking, AppSec, and Bug Bounty newsletter
Wednesday, March 6
Typo leads to RCE: CVE-2018-9022
TWEET OF THE DAY
If you ever wondered what it looks like when hackers find a cool bug.. here's a gif to explain it. (Featuring @0xteknogeek and @0xacb) - @NahamSec
OTHER ARTICLES WE’RE READING
Overview for Automating Web Application Bug Hunting by Jerry Gambun at BSides SF
Ghidra open sourced by NSA.
MIT Tech Review profiles Triton malware
Tenable pwning the smart home
A cat explains DNS thanks to Ryan Chapman for sharing this gem at BSidesSF
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
“While this was the first… I’d be surprised if it turns out to be the last.”
Reduce your company’s risk of security vulnerabilities and tap into the world’s largest community of security hackers. Contact us today to see which program is the right fit.