thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43961

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

The AI impact. A triager's perspective

https://www.intigriti.com/blog/business-insights/the-ai-impact-a-triagers-perspective

Читать полностью…

The Bug Bounty Hunter

The Danger of Multi-SSO AWS Cognito User Pools · Doyensec's Blog

https://blog.doyensec.com/2026/05/05/cloudsectidbits-masso-cognito-sso.html

Читать полностью…

The Bug Bounty Hunter

Release v3.8.0 · projectdiscovery/nuclei

https://github.com/projectdiscovery/nuclei/releases/tag/v3.8.0

Читать полностью…

The Bug Bounty Hunter

3 ways custom scan checks turn practitioner knowledge into scalable automation

https://portswigger.net/blog/3-ways-custom-scan-checks-turn-practitioner-knowledge-into-scalable-automation

Читать полностью…

The Bug Bounty Hunter

Claude Security is now in public beta

https://claude.com/product/claude-security#public-beta

Читать полностью…

The Bug Bounty Hunter

Extending Ruzzy with LibAFL

https://blog.trailofbits.com/2026/04/29/extending-ruzzy-with-libafl/

Читать полностью…

The Bug Bounty Hunter

The Trust Gap Behind the AI Coding Boom: What 200 Security Practitioners Just Told Us — ProjectDiscovery Blog

https://projectdiscovery.io/blog/the-trust-gap-behind-the-ai-coding-boom-what-200-security-practitioners-just-told-us

Читать полностью…

The Bug Bounty Hunter

Intigriti Bug Bytes #235 - April 2026 🚀

https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-235-april-2026

Читать полностью…

The Bug Bounty Hunter

Trailmark turns code into graphs

https://blog.trailofbits.com/2026/04/23/trailmark-turns-code-into-graphs/

Читать полностью…

The Bug Bounty Hunter

CVE-2026-41238: How Prototype Pollution Turns DOMPurify Into an XSS Gadget

https://labs.trace37.com/blog/dompurify-pp-ceh-bypass/

Читать полностью…

The Bug Bounty Hunter

Common misconceptions debugged!

https://www.intigriti.com/blog/business-insights/common-misconceptions-debugged

Читать полностью…

The Bug Bounty Hunter

Introducing the official Burp Ambassador Program

https://portswigger.net/blog/introducing-the-official-burp-ambassador-program

Читать полностью…

The Bug Bounty Hunter

Bringing Rust to the Pixel Baseband

http://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html

Читать полностью…

The Bug Bounty Hunter

How We Cut LLM Costs by 59% With Prompt Caching — ProjectDiscovery Blog

https://projectdiscovery.io/blog/how-we-cut-llm-cost-with-prompt-caching

Читать полностью…

The Bug Bounty Hunter

PortSwigger partners with Meta Bug Bounty to empower bug hunters with training and Pro licenses

https://portswigger.net/blog/portswigger-partners-with-meta-bug-bounty-to-empower-bug-hunters-with-training-and-pro-licenses

Читать полностью…

The Bug Bounty Hunter

C/C++ checklist challenges, solved

https://blog.trailofbits.com/2026/05/05/c/c-checklist-challenges-solved/

Читать полностью…

The Bug Bounty Hunter

$170k in Bypasses: The Vercel React2Shell Challenge

https://www.hacktron.ai/blog/react2shell-vercel-waf-bypass

Читать полностью…

The Bug Bounty Hunter

ImagePanick: From SVG to RCE Chaining Weak Policies and Bugs in ImageMagick and Ghostscript

https://blog.deephacking.tech/en/posts/imagepanick-from-svg-to-rce-imagemagick-ghostscript/

Читать полностью…

The Bug Bounty Hunter

Exploiting SQL injection vulnerabilities

https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-sql-injection-sqli-vulnerabilities

Читать полностью…

The Bug Bounty Hunter

Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

https://xint.io/blog/copy-fail-linux-distributions

Читать полностью…

The Bug Bounty Hunter

PortSwigger recognized at the Northern Tech Awards 2026.

https://portswigger.net/blog/portswigger-recognized-at-the-northern-tech-awards-2026

Читать полностью…

The Bug Bounty Hunter

Benchmarking Neo's Black-Box DAST Capabilities — ProjectDiscovery Blog

https://projectdiscovery.io/blog/neo-black-box-dast-capabilities

Читать полностью…

The Bug Bounty Hunter

AI threats in the wild: The current state of prompt injections on the web

http://security.googleblog.com/2026/04/ai-threats-in-wild-current-state-of.html

Читать полностью…

The Bug Bounty Hunter

Vulnpocalypse Now? How AI is changing vulnerability discovery

https://www.intigriti.com/blog/business-insights/vulnpocalypse-now-how-ai-is-changing-vulnerability-discovery

Читать полностью…

The Bug Bounty Hunter

Release v3.8.0 · projectdiscovery/nuclei

https://github.com/projectdiscovery/nuclei/releases/tag/v3.8.0

Читать полностью…

The Bug Bounty Hunter

We beat Google’s zero-knowledge proof of quantum cryptanalysis

https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/

Читать полностью…

The Bug Bounty Hunter

A(I) future of Bug Bounty

https://www.intigriti.com/blog/business-insights/ai-future-of-bug-bounty

Читать полностью…

The Bug Bounty Hunter

Protecting Cookies with Device Bound Session Credentials

http://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html

Читать полностью…

The Bug Bounty Hunter

Master C and C++ with our new Testing Handbook chapter

https://blog.trailofbits.com/2026/04/09/master-c-and-c-with-our-new-testing-handbook-chapter/

Читать полностью…

The Bug Bounty Hunter

Five takeaways from the UK’s Cyber Security & Resilience Bill

https://www.intigriti.com/blog/news/key-takeaways-from-the-uk-cyber-security-and-resilience-bill

Читать полностью…
Subscribe to a channel