Logo YesWeHack
Blog
LoginContact Us

News

  1. Blog
  2. News
GitHub screenshot

‘Airborne’ AirPlay attacks, netting $64k from deleted files, triaging AI slop – ethical hacker news roundup

Read More ->
How the Software as a Service (SaaS) model creates single points of failure

UK retail cyber-attacks a ‘wake-up call’, SaaS overreliance ‘creating single points of failure’, calls for global regulatory alignment – OffSec roundup for CISOs

Read More ->
Vulnerabilities affecting middleware

Middleware mayhem, Zoolander banter PoC, Malta to pardon hackers over ‘unfair’ charges – ethical hacker news roundup

Read More ->
UK issues NIS V2 blueprint – article about Cyber Security and Resilience Bill

UK publishes proposals for NIS 2-equivalent Cyber Security and Resilience Bill

Read More ->
SPYWARE ACCORD ADOPTED IN PARIS

Spyware pact draws distinction between malicious and legitimate use of cyber-intrusion tools

Read More ->
EUCC CERT SCHEME, implications for vuln management

EUCC cyber certification scheme enters early adopter phase after vulnerability disclosure rules issued

Read More ->
UK issues NIS V2 blueprint – article about Cyber Security and Resilience Bill

UK publishes proposals for NIS 2-equivalent Cyber Security and Resilience Bill

YouTube

YouTube email leak exploit, Great ‘Wallbleed’ of China, Burp’s overlooked ‘best feature’ – ethical hacker news roundup

Read More ->
US Capitol Building depicted for article about a VDP bill mandating vulnerability disclosure policies for federal contractors clearing the US house

US House passes bill mandating vulnerability disclosure policies for federal contractors

Read More ->
AI software developer, depicted as humanoid robot, does some coding

Junior devs ‘can’t actually code’, AI coding risks, security researchers decry inscrutable AI – OffSec roundup for CISOs

Read More ->
YouTube

YouTube email leak exploit, Great ‘Wallbleed’ of China, Burp’s overlooked ‘best feature’ – ethical hacker news roundup

Bounty Grid Boost: Ethical Hackers Invited to Strengthen the Security of the French Government’s Digital Services

Read More ->
Trophy for the top web hacking techniques of 2024

Top web hacking techniques of 2024, McDelivery hijack, 4D SOTA jailbreak – ethical hacker news roundup

Read More ->
Vulnerability or bug management cycle

Vulnerability management reboot sought, CISOs more influential in boardroom, Trump’s cyber overhaul – OffSec roundup for CISOs

Read More ->

Bounty Grid Boost: Ethical Hackers Invited to Strengthen the Security of the French Government’s Digital Services

1/7
1234567
Next

Footer

Logo YesWeHack
Logo YesWeHack

Products

  • Bug Bounty
  • Vulnerability Disclosure Policy
  • Pentest Management
  • Attack Surface Management
  • Live Hacking Events

Researchers

  • Start Hunting
  • Public Programs
  • Tools
  • Ranking
  • Dojo

Resources

  • Blog
  • Case Studies
  • Videos
  • Help Center
  • API
  • Github
  • Newsletter

Company

  • About YesWeHack
  • Trust & Security
  • Career
  • Press
  • Events
  • Contact

Follow us

Linkedin White
Twitter Logo
Youtube White
GitHub, YesWeHack

©2025 YESWEHACK

  • Legal Notices
  • Privacy Policy
  • Cookies Policy
  • Change Cookie Preferences