AI vulnerability testing: Knowing the In’s and Out’s of proper red teaming
To test the safety/security of a generative AI feature, what unchartered bugs and human testing parameters are we dealing with?
Read MoreSelect Page
By L L Seow | Monday, April 22, 2024, 4:40 PM Asia/Singapore | Case Study, Features
To test the safety/security of a generative AI feature, what unchartered bugs and human testing parameters are we dealing with?
Read MoreBy Luke Tucker, Senior Director, Global Hacker Community, HackerOne and webmaster webmaster | Monday, December 21, 2020, 11:35 AM Asia/Singapore | Newsletter, Opinions
…if they are ethical and are hackers. At least that is what the bug bounty community thrives on …
Read MoreBy L L Seow | Tuesday, December 1, 2020, 8:45 AM Asia/Singapore | Features, Newsletter
Here is a recap from seven experts, of the current year’s cybersecurity challenges and what we can look forward to next
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, September 3, 2020, 4:36 PM Asia/Singapore | News, Newsletter
Cheap-and-cheerful cloud storage solutions are abundant, but so are the cases of misconfigurations that can lead to hackings or data leaks.
On 1 Sep 2020, more than 108,000 scanned images of over 54,000 Australian driving licenses were found to have been leaked online. The leak was discovered by a Ukrainian security consultant who stumbled upon the folder on an Amazon storage service, which also contained phone numbers, addresses and birth dates, all available for public view.
Read MoreBy Rena Chua, Bug Bounty Advisor, HackerOne and webmaster webmaster | Monday, August 17, 2020, 12:15 PM Asia/Singapore | Newsletter, Opinions
Vendor consolidation and hacker-powered programs can reduce costs and improve cybersecurity, argues this bug bounty expert.
Remember those pre-pandemic days when you thought your security scope was complex? Now, with employees working from home, new video-and collaboration- apps being rolled into our daily workflows and less physical oversight of devices and access, it seems like we are all longing for the seemingly-airtight security of 2019, right?
Read MoreBy John Baker, Solutions Engineering Manager and Bug Bounty Advisor, HackerOne and webmaster webmaster | Tuesday, July 21, 2020, 5:46 PM Asia/Singapore | Newsletter, Opinions
A poll of CISOs about trusting bug bounty programs has revealed what makes them uneasy about...
Read MoreBy webmaster webmaster | Tuesday, May 5, 2020, 2:42 PM Asia/Singapore | Mobile Security, Newsletter, Tips
How Bluetooth contact tracing apps work, what it means for privacy, and what you should do about...
Read MoreBy Chua Bo Si, Technical Program Manager, HackerOne and webmaster webmaster | Friday, March 27, 2020, 12:05 PM Asia/Singapore | Newsletter, Tips
If software is the front line of your business, you probably have not overlooked any of these...
Read MoreBy webmaster webmaster | Friday, February 28, 2020, 5:22 PM Asia/Singapore | News, Newsletter
He is the seventh to do so on the HackerOne platform. The ranks of seven-figure-earning hackers on...
Read MoreBy webmaster webmaster | Monday, February 24, 2020, 11:37 AM Asia/Singapore | News, Newsletter
Could this latest debacle of 10.6m lost personal records have been proactively avoided and better...
Read More
PARTICIPATE NOW |
|