What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Hacking, AppSec, and Bug Bounty newsletter
Wednesday, May 1
Did Vodaphone find a backdoor in Huawei equipment? No. Is Telnet a backdoor? No. Did Bloomberg make a mistake. Yes, it appears so.
TWEET OF THE DAY
I look forward to the con submissions, threat intelligence reports and tweets about nation state whale attacks and how you can protect yourself by machine learning. - @dcuthbert
OTHER ARTICLES WE’RE READING
6 buckets of prodsec from Collin Greene. Prevented > autofound > humanfound > externally found > unfound > exploited. Shifting left = winning.
BSA Framework for secure software to help developers identify the state of software security and its security goals. Worthy goals by Apple, Microsoft, Oracle and others.
Some great infosec newsletters to follow. Also, RSS is back. Miessler says so.
Well done TikTok: Push notification for TikTok app serving up security quiz to its users
Oh the humanity. Comic Sans?!?
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Unsecured IoT devices will be like the new asbestos. We will build them into our environments, only to have to rip them back out years later.
Reduce your company’s risk of security vulnerabilities and tap into the world’s largest community of security hackers. Contact us today to see which program is the right fit.