🐝 Hive Five 202 - A Bias to Action
New terminal on the block: Ghostty, Neovim tutorial series, Docker fundamentals for hackers, and the Four Quarters productivity method. Recent buzz includes Meta’s Llama 3.3 70B model launch and cr...
New terminal on the block: Ghostty, Neovim tutorial series, Docker fundamentals for hackers, and the Four Quarters productivity method. Recent buzz includes Meta’s Llama 3.3 70B model launch and cr...
CORS vulnerabilities discovered in Go implementations. AI meeting assistant launch, web hacking activity guide. Successful SEO frameworks shared for AI startups.
In this HackerNotes, Rez0 joins Johann Rehberger to explore the complexities of AI application vulnerabilities. They dive into the significance of system prompts, obfuscation techniques to bypass s...
It’s the 100th episode! We’ve got some of the top hunters together to discuss their top bugs of 2024. We’ve also got a big CTBB pod announcement and a new (game-changer) plugin for Caido; Shift.
How to run a bug bounty program hackers will love to hack on.
HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I’ll explore some dangerous, lesser-known
In this HackerNotes, we’ve got Roni and Justin dissecting an old thread of Justin’s, breaking down how best to start bug bounty with the goal of making $100k in the first year.
We’ve got some cool war stories from Sharon, the differences between HackerOne and Pwn2Own, pwning OT/IoT devices, some high level methodologies and some approaches to more exotic attack surfaces i...
Hello nerds, IW Weekly is taking a short break for the remainder of the year. We’ll return refreshed and ready with more exciting updates in January 2025. Thank you for your support, and we ...
We’re back with some cool news items, including a recent Okta Bcrypt vulnerability, insights into crypto bugs, and some intricacies of Android and Chrome security. We also explore the latest resear...