Ethical Hacking

24 posts tagged with “Ethical Hacking”

A VDP szerepe a NIS 2 megfelelésben: Amit a sérülékenység közzétételi irányelvről tudni kell
September 02, 2024 · 7 min read

Az előző cikkben bemutattuk a NIS 2 irányelv követelményeit és a magyar vállalatokra gyakorolt hatását. Ebben a posztban részletesen tárgyaljuk a sérülékenység közzétételi irányelvet (VDP), amely a NIS 2 egyik kulcsfontosságú eleme. Megvizsgáljuk, miért nem elegendő egy egyszerű email cím a sérülékenységek bejelentésére, és miért van szükség jól felépített, strukturált VDP-re a vállalatok kiberbiztonsági pozíciójának erősítésére.

Why choose managed Vulnerability Disclosure Programs (mVDP)?
August 30, 2024 · 10 min read

Discover the importance of a well-structured Vulnerability Disclosure Policy (VDP) in the context of the NIS 2 Directive. Learn how VDPs enhance security, ensure legal compliance, boost reputation, and foster collaboration with the cybersecurity community.

Pentesting AI Applications with Hackrate and SplxAI
August 12, 2024 · 4 min read

With the implementation of the EU’s AI Act, Hackrate and SplxAI are enhancing AI security through a combination of automation and ethical hacking. Their partnership ensures comprehensive assessments, identifying vulnerabilities and ensuring compliance with new regulations.

NIS 2 irányelv — Mit kell tudnia a magyar cégeknek?
August 08, 2024 · 6 min read

2024. október 18-től a magyar vállalatoknak is alkalmazniuk kell a NIS2 védelmi intézkedéseket. Mi az a sérülékenység közzétételi irányelv (VDP) és miért fontos a NIS 2 megfeleléshez?

Navigating the NIS 2 directive - Key takeaways
August 06, 2024 · 6 min read

As the NIS2 Directive deadline approaches, immediate action is crucial. The European Union faces increased vulnerabilities due to frequent, sophisticated cyber-attacks, rapid digitization, and the looming threat of conflict. This urgency has driven the modernization of the Network and Information Security (NIS) Directive, resulting in the introduction of the NIS2 Directive.

How to set the scope and budget for pentests in SMBs?
June 05, 2024 · 6 min read

What are the key factors SMBs and IT security teams must consider before defining the scope and budget for their penetration tests? Read our blog to find out.

Security regulations and best practices for fintech in 2024
February 19, 2024 · 5 min read

Read about cybersecurity regulations shaping the fintech and banking landscape and the best practices to remain compliant and protect customer data.

Help us make security testing more transparent!
February 01, 2024 · 2 min read

We launched a survey to collect expert insights that will help us improve the features & functionalities of HackGATE™ — and increase transparency and accountability in security testing.

Cybersecurity 2024: AI threats, data phishing, and regulations
January 23, 2024 · 6 min read

Discover our predictions for 2024's biggest cybersecurity trends and learn how to stay ahead with proactive security strategies.

The UK’s new PSTI Act for IoT devices: how it impacts you & how we can help
January 10, 2024 · 4 min read

Learn about key requirements of the UK’s new PTSI legislation, penalties for non-compliance, and how our managed VDP can help you adhere to the regulations.

Measuring the success of bug bounty programs: outdated vs new methods
November 28, 2023 · 5 min read

Shift from outdated metrics to advanced methods to monitor the success of your Bug Bounty Programs. Learn how HackGATE's insights and control can help.

Increasing confidence in pentests: how to hold providers and testers accountable?
November 27, 2023 · 5 min read

Explore the importance of accountability in penetration testing. Learn how to choose the right provider, set security boundaries, and monitor testing activity.

How to simplify your SOC 2 compliance audit process using HackGATE
November 20, 2023 · 6 min read

Smoother compliance audits using HackGATE. From understanding compliance prerequisites to transparent security testing, documentation, and risk management.

Maximizing efficiency in Bug Bounty Programs with HackGATE
November 19, 2023 · 4 min read

Discover how HackGATE, an industry-first platform for monitoring penetration tests, can bring transparency and accountability to your bug bounty program.

Traditional pentest vs. bug bounty program: the pros, the cons, and how to do it right
October 24, 2023 · 7 min read

Traditional pentest and bug bounty both have their pros and cons — and for efficient security testing, making the right choice is crucial. Read our comparison.

State of Vulnerability Disclosure: Key learnings from our eBook
September 26, 2023 · 7 min read

Discover the key findings from our survey with security professionals, including the value of VDP for all organizations, the benefits of strong cybersecurity practices, and the importance of positive relationships with ethical hackers.

The illusion of automated vulnerability scans: unveiling the risks and limitations
July 18, 2023 · 6 min read

While automated vulnerability scans provide a quick overview, they often leave critical gaps that can expose businesses to potential risks, giving you a false sense of security. Read our blog post on the limitations of automated vulnerability scans and the steps you can take for a holistic security approach.

Introducing HackGATE: the industry’s first managed gateway for security testing
June 29, 2023 · 4 min read

HackGATE, the industry's first managed gateway for monitoring security testing projects, allows organizations to streamline the auditing process, improve transparency, and separate ethical hackers from real-life attacks, empowering them to take control and ensure comprehensive security testing aligned with industry best practices.

3 key factors to consider for Penetration Testing (as a Service)
May 04, 2023 · 7 min read

Learn the key factors to consider when planning Penetration Testing as a Service. Discover how ethical hackers can help organizations comply with regulatory requirements and industry standards while improving customer confidence and trust in their products and services.

thisclosed_#2
January 16, 2023 · 7 min read

PostgreSQL Database Exfiltration through the abuse of PostgREST requests

thisclosed_#1
January 04, 2022 · 4 min read

Full Account Takeover of ANY user via Insecure Direct Object Reference (IDOR) on reset password functionality

BitNinja bug bounty program - after the first week of testing
May 20, 2021 · 2 min read

BitNinja bug bounty program launched on our platform a few days ago, so far more than 100 ethical hackers have joined. Why the ethical hackers like this program? What are the most important factors in building up your bug bounty program?

Hunting for bugs – Getting started guide
December 02, 2020 · 6 min read

The purpose of the next few lines is to give some tips for those who just started diving into hacking. The topic is divided into two parts. Firstly, I would like to present one way to build an elementary knowledge base; then, I’ll give you an idea of how you can use it in bug bounty.

Launching a bug bounty program from a CISO's perspective
November 18, 2020 · 5 min read

How can I measure the security level of our IT systems? Should I change our pentester company every year? Where should I store the results of pentest reports? Are these questions familiar to you? If so, keep reading.