166 Cybersecurity Statistics and Trends [updated 2022]
These cybersecurity statistics for 2021 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, job outlook.
Entreprises, comment éviter les remontées sauvages de failles de sécurité ?
Bon, vous le savez, depuis 2013 on organise des Bugs Bounties avec les copains de YesWeHack. Et en 2015, on a décidé de créer www.yeswehack.com, une plateforme qui permet facilement à chaque sociét…
What does the Product Security and Telecommunications Infrastructure bill mean for me? | Pen Test Partners
The UK’s Department for Culture, Media and Sport (DCMS) introduced a bill to Parliament yesterday. But what does that mean for IoT manufacturers and consumers? First, this bill has been […]
The new Sanitizer API aims to build a robust processor for arbitrary strings to be safely inserted into a page. This article introduces the API, and explains its usage.
Proposé par Université de Stanford. Cryptography is an indispensable tool for protecting information in computer systems. In ... Inscrivez-vous gratuitement.
XS-Leaks Wiki # Overview # Cross-site leaks (aka XS-Leaks, XSLeaks) are a class of vulnerabilities derived from side-channels 1 built into the web platform. They take advantage of the web’s core principle of composability, which allows websites to interact with each other, and abuse legitimate mechanisms 2 to infer information about the user. One way of looking at XS-Leaks is to highlight their similarity with cross-site request forgery (CSRF 3) techniques, with the main difference being that instead of allowing other websites to perform actions on behalf of a user, XS-Leaks can be used to infer information about a user.
Hacker earns $2 million in bug bounties on HackerOne
Inhibitor181 is the first bug bounty hunter to earn more than $2,000,000 in bounty awards through the vulnerability coordination and bug bounty program HackerOne.
J’ai récemment vu passer un tweet de la gendarmerie des Vosges sur la solidité des mots de passe contenant ce tableau : https://twitter.com/Gendarmerie088/status/1303213404669308928 Bien que très intéressant et donnant une bonne idée de la complexité qu’il faut donner à un mot de passe, cette
This article covers security aspects to consider when creating forms for the web. We'll be applying security principles for the frontend, backend, DNS and more.
Un objet connecté (IoT) peut présenter des vulnérabilités. Voici 10 bonnes pratiques à adopter pour utiliser au mieux vos objets connectés en sécurité.