What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Hacking, AppSec, and Bug Bounty newsletter
Monday, March 11
Good article by Techcrunch’s Zach Whittaker on one students expulsion from college 4-months before graduation on suspicion of elaborate “grade hacking”. Student claims innocence and darn well may be, sad to see.
OTHER ARTICLES WE’RE READING
Venezuala’s power outages - cyber attack or domestic infrastructure challenges? Probably both but more the latter says Kalev Leetaru in a Forbes opinion article.
Vimeo SSRF with code execution potential by @rootxharsh
Hackers @rhynorator and @stok sharing technical learnings and their experiences at h1-415
Check Point researchers found a tool in an Ultrasound machine running on Windows 2000, making it easy to exploit vulnerabilities and access its database of ultrasound images.
Sublert, tool to help you monitor newly deployed subdomains by yassineaboukir
Get paid to learn to hack with @daeken
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: firstname.lastname@example.org
Sometimes you catch the bug. Sometimes the bug catches you.
Zen Master Meals
Reduce your company’s risk of security vulnerabilities and tap into the world’s largest community of security hackers. Contact us today to see which program is the right fit.