Tag: EN

Identity Theft: The Silent Threat for Executives

Identity theft isn’t a new phenomenon, but its rise in the executive world can no longer be ignored. As a CISO, you understand the importance of safeguarding not only your organization’s data but also the personal information of your top-level…

Hackers Abusing OAuth Token to Take Over Millions of Accounts

A new OAuth vulnerability has been discovered in three of the major extensions such as Grammarly, Vidio, and Bukalapak. These applications use the OAuth protocol for their authentication, which is vulnerable to an authentication token-stealing attack. OAuth is an authentication…

The myth of the long-tail vulnerability

A long tail distribution of exploit attempts sounds reasonable. But is this how exploitation attempts really play out? Do attackers abandon exploits after a certain stage? This article has been indexed from Cisco Blogs Read the original article: The myth…

HackerOne awarded over $300 million bug hunters

HackerOne announced that it has awarded over $300 million bug hunters as part of its bug bounty programs since the launch of its platform. HackerOne announced that it has surpassed $300 million in total all-time rewards on the HackerOne platform.…