Microsoft announces Zero Day Quest hacking event with big rewards

Microsoft is enhancing its bug bounty initiatives with the launch of the Zero Day Quest hacking event. With $4 million in potential rewards, it focuses on driving research in critical areas such as cloud computing and AI. Event focus The event invites … Continue reading Microsoft announces Zero Day Quest hacking event with big rewards

x64dbg: Open-source binary debugger for Windows

x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the source code. It offers a wide range of features and a plugin system, allowing you to customize and extend i… Continue reading x64dbg: Open-source binary debugger for Windows

Apple offers security researchers specialized iPhones to tinker with

Apple is inviting security researchers to apply for the Apple Security Research Device Program (SRDP) again, to discover vulnerabilities and earn bug bounties. Apple started the Apple SRDP in 2019. In the intervening years, participating researchers ha… Continue reading Apple offers security researchers specialized iPhones to tinker with

Google invites bug hunters to scrutinize its open source projects

Google wants to improve the security of its open source projects and those projects’ third-party dependencies by offering rewards for bugs found in them. “Depending on the severity of the vulnerability and the project’s importance, rewards … Continue reading Google invites bug hunters to scrutinize its open source projects

The Intigriti Ethical Hacker Survey 2022

The Intigriti Ethical Hacker Survey 2022 is now available, highlighting how ethical hacking continues to grow as a popular career choice for all levels of security experts. For the second year running, Intigriti has gone into the field and spoken to a … Continue reading The Intigriti Ethical Hacker Survey 2022

Cisco security devices targeted with CVE-2020-3580 PoC exploit

Attackers and bug hunters are leveraging an exploit for CVE-2020-3580 to compromise vulnerable security devices running Cisco ASA or FTD software. Active attacks apparently started after Positive Technologies researchers shared proof-of-concept (PoC) e… Continue reading Cisco security devices targeted with CVE-2020-3580 PoC exploit

MindAPI makes API security research and testing easier

Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. They help me create a fine-tuned methodology and keep the mind organized,&#822… Continue reading MindAPI makes API security research and testing easier

2021 Hacker Report: Hackers are not just driven by money

HackerOne released its 2021 Hacker Report that reveals a 63% increase in the number of hackers submitting vulnerabilities in 2020. As organizations’ attack surfaces have shifted due to pandemic led digital transformation, hackers have adapted and zeroe… Continue reading 2021 Hacker Report: Hackers are not just driven by money