Plato Data Intelligence.
Vertical Search & Ai.

Tag: HackerOne

Intel Patched 226 Vulnerabilities in 2021

Intel patched 226 vulnerabilities in its products last year, according to data from the 2021 Product Security Report released by the chip giant on Thursday.

read more

TikTok’s Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency

The social media platform's global security chief boils it down to being consistent, keeping it fun, and demonstrating the impact of choices.

HackerOne Scores $49 Million Investment to Advance Ethical Hacking as a Security Strategy

“White Hat” hacker-based security platform HackerOne – which demonstrated its bug bounty and vulnerability disclosure platform at our developers conference FinDEVr in London in 2017 – has secured $49 million in Series E funding. The round was led by GP Bullhound, and gives the San Francisco, California-based firm nearly $160 million in total funding. Benchmark, Read more...

The post HackerOne Scores $49 Million Investment to Advance Ethical Hacking as a Security Strategy appeared first on Finovate.

HackerOne Bags $49 Million in Series E Funding

Hacker-powered bug bounty platform HackerOne on Thursday announced that it has received $49 million in Series E investment, which brings the total raised by the company to $160 million.

The funding round was led by GP Bullhound and received participation from Benchmark, Dragoneer Investment Group, NEA, and Valor Equity Partners.

read more

PSA: CSGO Fans Beware, Unfixed Steam Invite Hack Could Take Over Your PC.

by Cole Travis | Apr, 14th 2021 While Bugs aren’t uncommon in games, it’s only every so often that bug is so detrimental...

What are Insecure Direct Object References (IDOR)?

@hacker0x01HackerOneHackerOne empowers the world to build a safer internet. Insecure Direct Object References (or IDOR) is a simple bug that packs a punch....

What happens after you accidentally leak secrets to a public code repository

@shhgitPaul Price @ shhgitWe find secrets in your code — before the bad guys do.How we find secrets in your code before the...

Potential of AI and machine learning to stop bot attacks

By Priya DialaniThe vast majority know about automated bots like AI powered chatbots are really software applications that can utilize artificial intelligence to...

IOTW: Ethical Hackers Discover Several Apple Vulnerabilities—And The Payout May…

Ethical hackers- sometimes known as white hat hackers, recently participated in Apple’s vulnerability bounty program and scored big. Over the span of three...

Researchers, Companies Slam Mobile Voting Firm Voatz for ‘Bad Faith’ Attacks

In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security...

Slack Patches Critical Desktop Vulnerability

The remote code execution flaw could allow a successful attacker to fully control the Slack desktop app on a target machine.Slack has patched...

Secure Development Takes a (Remote) Village

The shift to work from home isn't just about giving your Dev team the physical tools they need.Development is a collaborative process. Yes,...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?