WhiteHat Security
WhiteHat Security
YouTube Video
  • Uber hacked! The news just broke that Uber had a massive data breach in 2016 and paid hackers $100,000 to delete the data and not go public with the hack. One year later the breach was announced and the CISO of Uber has been fired. Join Ryan O’Leary, Dan Lacey, and Katherine Haworth as they discuss this massive breach. Follow us! Twitter: https://twitter.com/whitehatsec https://twitter.com/olear...

WhiteHat Security
WhiteHat Security
YouTube Video
  • It’s the return of HackerKast with our hosts, Ryan O’Leary and Rob Tate. In this episode Ryan and Rob will probe into the target=_blank vulnerability that has been making the rounds through the security industry. They’ll answer the question, what is this vulnerability, is it bad, and should you pay attention to it? Follow us! Twitter: https://twitter.com/whitehatsec https://twitter.com/olearyrya...

WhiteHat Security
WhiteHat Security
Blog Post
  • I watched Black Panther this weekend, and outside of being gob-smacked by a brilliant script, soundtrack, sets, cinematography, I fell in love with Princess Shuri. Yes, the time is right for a 16-year old R&D Scientist with a message I want to send to every engineering department in the world. Especially with International Women’s Day […] The post “Just because something works doesn’t mean it can’...

WhiteHat Security
WhiteHat Security
Blog Post
  • In 2017, we made a concerted effort to provide more helpful resources to the application security space, and we’re thrilled that these assets were of value to so many people and organizations, across a multitude of industries. Here’s a rundown of some of our most popular whitepapers of 2017: Ironclad APIs: An Approach to Application […] The post WhiteHat Security’s Most Popular Whitepapers of 2017...

WhiteHat Security
WhiteHat Security
Blog Post
  • The Olympics are meant to be a celebration of the human spirit.  A spectacle of national pride.  A living, breathing example of the limits of the mind and the body.  Through the Olympics, we get to experience the thrill of victory, and the agony of defeat.  Wait.  I’ve started to sound like a 1970s sportscaster.  […] The post Cyber Attackers: A perfect 10! Olympic Committee: Failed to qualify. app...

WhiteHat Security
WhiteHat Security
Blog Post
  • Does anyone else remember that AWESOME TV game show that aired in the US in the early 2000s?  It had that delightful British woman who would gaze at the contestants with only slightly disguised contempt, and then send the least intellectually capable off with a dismissive nod and a wonderfully throaty: “You ARE the weakest […] The post You ARE the weakest link! appeared first on WhiteHat Security.

WhiteHat Security
WhiteHat Security
Blog Post
  • An estimated 90 percent of your code is from open source and third-party libraries. How are you verifying that you have the latest version? In order to fully understand your application vulnerabilities and the overall security posture of your web and mobile applications, you need in-depth visibility into the third-party components that you are using. […] The post Software Composition Analysis: Ide...

WhiteHat Security
WhiteHat Security
Blog Post
  • Do you know to whom you owe a first debt here at the start of 2018? I do. I’d like everyone to pause, and in their minds and hearts say thank you to the hundreds of engineers at various hardware, software, and security vendors who spent their holidays working on OS patches, browser patches, cloud […] The post The Meltdown Over Spectre appeared first on WhiteHat Security.

WhiteHat Security
WhiteHat Security
Blog Post
  • Well, I called it at the end of 2016. 2017 was a slurry of accusations as well as actual proof found of Russian meddling in U.S. politics via both state infrastructure systems and with regards to online propaganda on social media. Even more specifically, I also correctly called the meddling of the Russian propaganda machine […] The post Nation State Activity – The continuing story for 2018 appeare...

WhiteHat Security
WhiteHat Security
YouTube Video
  • In this video, Ryan O'Leary and Rob Tate show you how the Apache Struts 2 vulnerability works; the exploit that was used for the massive Equifax hack, one of the largest breaches in history. The moral of the story, make sure to update any vulnerability versions in software! Follow us! Twitter: https://twitter.com/whitehatsec https://twitter.com/olearyryanp https://twitter.com/_robotate Facebook...

WhiteHat Security
WhiteHat Security
Blog Post
  • Clever Name, Derivative Attack Dust off your Old Glory Insurance policy, ROBOT attack is now a real thing that can happen to you.  Researchers Hanno Böck, Juraj Somorovsky, and Craig Young have a new attack to tell you about, and they have named it Return of Bleichenbacher’s Oracle Threat (ROBOT).  To sum it up in […] The post ROBOT: For When the Metal Ones Decide to Come for You appeared first on...

WhiteHat Security
WhiteHat Security
Blog Post
  • 2018 is right around the corner, and with the changing of the calendar people naturally gravitate to looking ahead and thinking about everything that will happen in 2018. Security is no different and we often are asked, what’s going to happen in 2018? Last year on December 13th, 2016, I posted up my prediction. Here’s […] The post Security Predictions 2018 appeared first on WhiteHat Security.

WhiteHat Security
WhiteHat Security
Blog Post
  • The security industry needs unbiased sources of information who share best practices with an active membership body who advocates for open standards. In the AppSec world, one of the best is the Open Web Application Security Project (or OWASP). Standards and best practices have to evolve over time. Earlier this year, the OWASP community issued […] The post OWASP – The Superhero of AppSec appeared f...

WhiteHat Security
WhiteHat Security
Blog Post
  • The evolution of software development has gone from typical waterfall environments, where software releases happen every few months, to extreme DevOps or Continuous Delivery environments, releasing every few minutes. As our infographic states, 62 percent of developers say that the pace of software development is rapid. And not surprisingly, 30 percent of data breaches are […] The post Developers: ...

WhiteHat Security
WhiteHat Security
Blog Post
  • 2017 has been a wild ride in the security world. This year we saw several high-profile breaches and cyber-attacks, the most notable being the Equifax breach and the WannaCry malware campaign. While the outcome of these events is unfortunate, they provide us with valuable lessons to learn about enhancing our security. What did WannaCry and […] The post Prediction: Automatic Updates are the Future a...

WhiteHat Security
WhiteHat Security
YouTube Video
  • The news just broke that Uber had a massive data breach in 2016 and paid hackers $100,000 to delete the data and not go public with the hack. One year later the breach was announced and the CISO of Uber fired. Join Ryan O’Leary, Dan Lacey, and Katherine Haworth as they discuss this massive breach. Follow us! Twitter: https://twitter.com/whitehatsec https://twitter.com/olearyryanp https://twitter...

WhiteHat Security
WhiteHat Security
Blog Post
  • The news was just released that a massive breach hit Uber in October of 2016. The personal information of 57 million Uber users and 7 million Uber drivers were stolen, including names, email addresses and phone numbers. In addition, about 600,000 drivers’ license numbers of Uber drivers were also stolen. This type of breach typically […] The post Who’s Driving Security for Uber? appeared first on ...

WhiteHat Security
WhiteHat Security
Blog Post
  • Black Friday and Cyber Monday are less than a week away and the sales have already begun. As people are hunting for the best deal on that new TV, they often forget about security entirely. So what should we all be worried about when buying items this holiday season and what can we do to […] The post Tips for Safe Shopping in Stores or Online During the Holiday Season appeared first on WhiteHat Sec...

WhiteHat Security
WhiteHat Security
YouTube Video
  • It’s the return of HackerKast with our hosts, Ryan O’Leary and Rob Tate. In this episode Ryan and Rob will probe into a vulnerability that has been making the rounds through the security industry. They’ll answer the question, what is this vulnerability, is it bad, and should you pay attention to it? Follow us! Twitter: https://twitter.com/whitehatsec https://twitter.com/olearyryanp https://twitt...

WhiteHat Security
WhiteHat Security
Blog Post
  • Some questions have been popping up about the browser behavior around links in new tabs.  Specifically, the page opened in the new tab can cause the original tab to navigate away, possibly leading to a fake login window or other spoof.   Target=_blank: Not Too Bad Every year or two we get questions about a […] The post “HREF with Target” Weakness appeared first on WhiteHat Security.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.