Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks: Lock and Code S02E15

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Aug 2021 15:07:58 +0000

On Lock and Code this week, we speak with Luta Security CEO and founder Katie Moussouris about how she hacked Clubhouse.

Categories: Podcast

Tags:

(Read more…)

The post Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks: Lock and Code S02E15 appeared first on Malwarebytes Labs.

Read more

A week in security (August 2 – August 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Aug 2021 11:10:23 +0000

A roundup of the previous week’s breaking information security news and happenings, dated August 2 through August 8.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (August 2 – August 8) appeared first on Malwarebytes Labs.

Read more

A week in security (April 19 – 25)

Credit to Author: Malwarebytes Labs| Date: Mon, 26 Apr 2021 10:31:58 +0000

A roundup of the previous week’s security news, from April 19 to 23.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (April 19 – 25) appeared first on Malwarebytes Labs.

Read more

Interview with a bug bounty hunter: Youssef Sammouda

Credit to Author: Pieter Arntz| Date: Tue, 20 Apr 2021 16:43:18 +0000

Youssef Sammouda is a bug bounty hunter with 100 resolved Facebook reports to his name. We interviewed him about his amazing work.

Categories: HackingSecurity world

Tags:

(Read more…)

The post Interview with a bug bounty hunter: Youssef Sammouda appeared first on Malwarebytes Labs.

Read more

Have a domain name? “Beg bounty” hunters may be on their way

Credit to Author: Chester Wisniewski| Date: Mon, 08 Feb 2021 14:00:01 +0000

You are probably familiar with the popular practice of “bug bounty” programs in software security, where an organization offers rewards or bounties to security researchers who ethically disclose security vulnerabilities in their software. Organizations set terms for bugs they will reward. Typically, the more severe the flaw, the higher the bounty. However, if, like myself, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vzQavPtcKJo” height=”1″ width=”1″ alt=””/>

Read more

How CVSS works: characterizing and scoring vulnerabilities

Credit to Author: Eddie Segal| Date: Wed, 13 May 2020 15:30:00 +0000

CVSS, or Common Vulnerability Scoring System, provides developers, testers, and security professionals with a standardized process to assess vulnerabilities.

Categories:

Tags:

(Read more…)

The post How CVSS works: characterizing and scoring vulnerabilities appeared first on Malwarebytes Labs.

Read more