Apple offers security researchers specialized iPhones to tinker with

Apple is inviting security researchers to apply for the Apple Security Research Device Program (SRDP) again, to discover vulnerabilities and earn bug bounties. Apple started the Apple SRDP in 2019. In the intervening years, participating researchers ha… Continue reading Apple offers security researchers specialized iPhones to tinker with

Inspiring secure coding: Strategies to encourage developers’ continuous improvement

In software development, the importance of secure coding practices cannot be overstated. Fostering a security culture within development teams has become crucial to ensure the integrity and protection of digital systems. To delve deeper into this topic… Continue reading Inspiring secure coding: Strategies to encourage developers’ continuous improvement

Google triples reward for Chrome full chain exploits

Google has tripled the full reward amount for the first security bug report that includes a functional full chain exploit of its popular Chrome browser. Six months of higher rewards for a Chrome full chain exploit The Chrome Vulnerability Rewards Progr… Continue reading Google triples reward for Chrome full chain exploits

Uber’s ex-CSO avoids prison after data breach cover up

After covering up a data breach that impacted the personal records of 57 million Uber passengers and drivers, the company’s former Chief Security Officer has been found guilty and sentenced by a US federal judge.

Read more in my article on the Hot f… Continue reading Uber’s ex-CSO avoids prison after data breach cover up

Hack the Pentagon website promotes the benefits of bug bounties to US Military

My guess is that if you stumbled across a website that called itself “Hack the Pentagon” and was decorated with a grisly-looking skull, you would probably think that you might be somewhere less than legitimate.

After all, normally if you hacked The … Continue reading Hack the Pentagon website promotes the benefits of bug bounties to US Military

Vulnerability Enabled Bing.com Takeover, Search Result Manipulation

By Habiba Rashid
Cybersecurity researchers at Wiz reported the vulnerability to Microsoft and dubbed the attack “BingBang”.
This is a post from HackRead.com Read the original post: Vulnerability Enabled Bing.com Takeover, Search Result Manipulation
Continue reading Vulnerability Enabled Bing.com Takeover, Search Result Manipulation