sign up
sign up
sign up
sign up
pull down to refresh
The Insectoid Frontier - A Journey Through the World of Bug Bounties
hacker.bearblog.dev/the-insectoid-frontier-a-journey-through-the-world-of-bug-bounties/
289 sats
\
0 comments
\
@geeknik
29 Feb 2024
security
related
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
www.theregister.com/2024/08/14/august_patch_tuesday/
395 sats
\
0 comments
\
@dontforgetthekeys
14 Aug 2024
security
Critical Security Flaw Exposes 1 Million WordPress Sites to SQL Injection
www.darkreading.com/remote-workforce/critical-security-flaw-wordpress-sql-injection
137 sats
\
0 comments
\
@ch0k1
4 Apr 2024
security
All that is wrong with bug bounty in a single image
1424 sats
\
11 comments
\
@r3drun3
16 Apr 2024
security
Google Paid Out $12 Million via Bug Bounty Programs in 2024
143 sats
\
0 comments
\
@suraz
10 Mar 2025
tech
Wa Post: If you created a bitcoin wallet before 2016, your money may be at risk
615 sats
\
2 comments
\
@Bitman
17 Nov 2023
bitcoin
freebie
Trillion-Dollar Salvage - Nic Carter wrote a quantum-breaks-Bitcoin thriller
trilliondollarsalvage.pages.dev/
786 sats
\
11 comments
\
@Scoresby
6 Jan
bitcoin
BooksAndArticles
Lightning Bounties: Mentoring MIT Bitcoin Hackathon 2025
medium.com/@mabramo11/lightning-bounties-mentoring-mit-bitcoin-hackathon-2025-ee064bed8cc2
1327 sats
\
0 comments
\
@PlebLab
15 Apr 2025
builders
Hacker Used Anthropic’s Claude to Steal Sensitive Mexican Data - Bloomberg
www.bloomberg.com/news/articles/2026-02-25/hacker-used-anthropic-s-claude-to-steal-sensitive-mexican-data
643 sats
\
1 comment
\
@Scoresby
25 Feb
AI
Can you spot the XSS vulnerability?
746 sats
\
29 comments
\
@ek
15 Mar 2025
security
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
215 sats
\
0 comments
\
@ch0k1
31 May 2025
security
How a Child Prodigy was helped by his Mama Bear (and then saved the internet)
7222 sats
\
5 comments
\
@Bitman
14 Sep 2023
bitcoin
We fight for our privacy: the case of Tornado Cash
15.2k sats
\
2 comments
\
@softglitter2d
7 Sep 2023
bitcoin
SonicWall Firewall Vulnerability Exploited After PoC Publication
www.securityweek.com/sonicwall-firewall-vulnerability-exploited-after-poc-publication/
141 sats
\
0 comments
\
@ch0k1
15 Feb 2025
security
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code
thehackernews.com/2025/08/attackers-abuse-velociraptor-forensic.html
160 sats
\
0 comments
\
@ch0k1
30 Aug 2025
security
Privacy matters! The disappearance of a programmer, bitcoin and the lost code
270 sats
\
0 comments
\
@GrinSingularity
14 Nov 2023
bitcoin
The 56 SN Territories Where You Can Fire Off Posts and Comments 🤠
2357 sats
\
7 comments
\
@satoshiplanet
27 Nov 2024
meta
The Publishing Forest of Nostr (Part 1)
143 sats
\
0 comments
\
@Hamstr
23 Apr 2024
BooksAndArticles
Anthropic has launched a code vulnerability scanner
claude.com/solutions/claude-code-security
181 sats
\
0 comments
\
@lunin
26 Feb
AI
Crypto Odyssey
wavlake.com/track/501fd55d-9c3f-4b9e-b0ba-f7e3080c3db2
349 sats
\
12 comments
\
@eddieoz
7 Apr 2024
Music
GrapheneOS: The Purpose, The Strategy, and The Why [Article]
125.8k sats
\
26 comments
\
@final
29 Sep 2024
tech
Cyber workers turning to crime, warns study
cybernews.com/news/cyber-workers-turning-to-crime/
296 sats
\
1 comment
\
@ch0k1
8 Mar 2024
security
more