PimpMyBurp #11 – Master Signed Token Exploits with SignSaboteur
Yes We Hack Blog
by
1w ago
..read more
Visit website
‘Collaboration helped me become successful’: Nagli on becoming a world-renowned Bug Bounty hunter
Yes We Hack Blog
by
1w ago
..read more
Visit website
New tool for finding mutated XSS, $20k Chromium sandbox escape, Live bug bounty results from Ekoparty – ethical hacker news roundup
Yes We Hack Blog
by
2w ago
..read more
Visit website
Attack surface discovery: mapping your exposed vectors with continuous threat exposure management (CTEM)
Yes We Hack Blog
by
2w ago
..read more
Visit website
Cyber Resilience Act: compliance countdown set to start for EU law focused on eliminating vulnerabilities
Yes We Hack Blog
by
2w ago
..read more
Visit website
‘Happy hunters equal happy customers and vice versa’: YesWeHack vulnerability triage chief Adrien Jeanneau on creating a virtuous Bug Bounty circle
Yes We Hack Blog
by
1M ago
..read more
Visit website
Dojo challenge #36 - Shell Escape winners and writeup
Yes We Hack Blog
by
1M ago
..read more
Visit website
NIS 2 in force, Cyber Resilience Act adopted, CISA hails VDP impact – OffSec roundup for CISOs
Yes We Hack Blog
by
1M ago
..read more
Visit website
‘The collective knowledge ATG gets is huge’: cyber chief on Betting brand’s Bug Bounty story
Yes We Hack Blog
by
1M ago
..read more
Visit website
‘I like Android apps and open-source code’: HakuPiku on Bug Bounty, CTFs and his favourite targets
Yes We Hack Blog
by
1M ago
..read more
Visit website

Follow Yes We Hack Blog on FeedSpot

Continue with Google
Continue with Apple
OR