Current News
Microsoft's 24H2 Update and Windows Recall Microsoft's latest 24H2 update for Windows 11 is making waves due to its integration of the Recall feature, an AI-driven tool designed to create a searchable timelapse of desktop activities. Despite its innovative premise, Recall sparked controversy over pr...
A fusion startup based in Seattle, Zap Energy, has introduced a ground-breaking prototype named Century, claiming a milestone achievement in nuclear fusion technology. This device is heralded as the first fully-integrated demonstration encompassing multiple essential technologies for future fusion p...
SpaceX has made remarkable progress in the field of aerospace technology by successfully intercepting and recovering a descending rocket using mechanical arms. This feat signifies another leap forward in Elon Musk's ambitious vision of making space travel more economical and sustainable.
A New Era
...In recent developments, the social media platform X has restricted the sharing of links related to a hacked dossier of JD Vance after being alerted by the Trump campaign. This decision has drawn parallels with a previous incident where Elon Musk vocally criticized Twitter for halting the disseminati...
Tesla's recent Cybercab event showcased the much-anticipated Optimus robots, capturing attention with their lively personalities and surprising interactions. The robots mingled with attendees, served drinks, engaged in games, and even performed dances. Adding to the spectacle, they conversed with gu...
Mozilla Advances Local AI Development
As part of Mozillaâs ongoing commitment to advancing open source AI, the organization has announced its latest project under the Builders program: sqlite-vec. This initiative aligns with their theme of 'Local AI'âcreating AI applications that run entirel...
Mozilla recently announced a significant advancement in Firefox's security measures, focusing on improving their Inter-Process Communication (IPC) testing techniques. Firefox relies heavily on process separation for security, using multiple processes with unique privileges connected through IPC. For...
As AI technologies continue to progress, they bring new threats and vulnerabilities. The importance of maintaining the security and ethical use of these advanced systems has never been more critical. In response to this need, the 0Din program emerges as a specialized GenAI bug bounty initiative to f...
The widely-used Puppeteer browser automation library has expanded its capabilities to officially include support for Firefox starting from version 23. This exciting development means developers can now conveniently write and execute automated scripts and perform end-to-end testing across both Chrome...
Reinforcing Cybersecurity Across Europe
The European Union is advancing its cybersecurity efforts with the introduction of NIS2, a directive aimed at enhancing the resilience of critical sectors. This directive places new and updated obligations on entities to improve their cybersecurity risk mana...
Understanding Broken Access Control (BAC)
Broken Access Control (BAC) is a significant vulnerability type where unauthorized users gain access to sensitive features or data within an application. This flaw often arises when there are insufficient permission checks or when the application fails to...
In the ever-evolving landscape of cybersecurity, vulnerabilities known as Insecure Direct Object References (IDOR) pose significant threats if left unaddressed. A recent in-depth exploration highlights that IDOR vulnerabilities account for 7% of reported vulnerabilities on the HackerOne platform, wi...
Considering a career at HackerOne? Here's what you need to know about our recruitment process, from applying to getting onboarded as part of our team.
Application Review
When you submit your application, our recruitment team carefully evaluates your experience and skills to see how they match th...
Testing Methodologies
Enhancing the security of internal networks is crucial. To achieve this, HackerOne utilizes robust testing methodologies grounded in established frameworks such as PTES, OSSTMM, NIST SP 800-115, and CREST. These methodologies are tailored to analyze various assessment types,...
Dating app users of Feeld, a platform tailored for alternative relationship preferences, face potential privacy risks after cybersecurity specialists uncovered several vulnerabilities. These security gaps could allow unauthorized access to messages, intimate photos, and details of users' sexuality,...
Russia, under Vladimir Putin's guidance, is often described as a 'mafia state' intent on expanding its influence, akin to transforming into a 'mafia empire'. This analogy, mentioned by UK Foreign Secretary David Lammy, captures Putin's dual threat: a throwback to imperial aggression and a pioneer in...
Sellafield Ltd, responsible for the UKâs most hazardous nuclear site in Cumbria, has been ordered to pay nearly £400,000 following a guilty plea over significant cybersecurity violations. The company, state-owned and operated as part of the Nuclear Decommissioning Authority, faced charges related...
The days of repeatedly changing your passwords are coming to a close, much to the relief of many. With the increasing number of online accounts in both professional and personal spheres, managing passwords has become a significant challenge. The traditional practice of regularly changing passwords i...
Finding Humor in Medical Examinations
Reflecting on an anecdote shared by Lucy Mangan about her doctor's humorous take during a kidney-related discussion, I was reminded of my own experience during a prostate examination for an enlarged prostate. As I lay on the examination couch, the doctor light...
AMD Fluid Motion Frames 2 and Gaming Evolution
AMD has unveiled the latest in frame generation technology, AMD Fluid Motion Frames 2 (AFMF 2), designed to push gaming performance to new heights. Available now through a Technical Preview release driver for AMD Ryzen⢠AI 300 series processors, AFM...