<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[YesWeHack Blog | Cybersecurity Insights and Bug Bounty Trends| RSS Feed]]></title><description><![CDATA[Explore bug bounty insights on the YesWeHack Blog. Stay updated with vulnerability disclosure trends, hacker stories, and tips to excel in bug bounty programs.]]></description><link>https://www.yeswehack.com</link><image><url>https://www.yeswehack.com/assets/images/sprite/logo.svg</url><title>YesWeHack Blog | Cybersecurity Insights and Bug Bounty Trends| RSS Feed</title><link>https://www.yeswehack.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 17:44:32 GMT</lastBuildDate><atom:link href="https://www.yeswehack.com/rss.xml" rel="self" type="application/rss+xml"/><pubDate>Thu, 16 Apr 2026 17:44:32 GMT</pubDate><copyright><![CDATA[YesWeHack All rights reserved 2026]]></copyright><item><title><![CDATA[‘When we ask for help, it’s instant’: Banco Galicia on expanding vulnerability discovery and speeding up remediation]]></title><link>https://www.yeswehack.com/en/blog/instant-banco-galicia-vulnerability-remediation</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/instant-banco-galicia-vulnerability-remediation</guid><pubDate>Thu, 16 Apr 2026 13:18:00 GMT</pubDate></item><item><title><![CDATA[The ultimate Bug Bounty guide to OS command injection vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/ultimate-guide-os-command-injection</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ultimate-guide-os-command-injection</guid><pubDate>Tue, 14 Apr 2026 12:28:00 GMT</pubDate></item><item><title><![CDATA[Critical auth bypass in WordPress Azure AD SSO plugin due to missing OIDC id_token validation]]></title><link>https://www.yeswehack.com/en/blog/auth-bypass-wordpress-azure-plugin</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/auth-bypass-wordpress-azure-plugin</guid><pubDate>Fri, 10 Apr 2026 07:36:00 GMT</pubDate></item><item><title><![CDATA[‘Being a developer before, I know where to find bugs’: Aituglo’s Bug Bounty story so far]]></title><link>https://www.yeswehack.com/en/blog/developer-aituglo-bug-bounty-story</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/developer-aituglo-bug-bounty-story</guid><pubDate>Fri, 03 Apr 2026 10:08:00 GMT</pubDate></item><item><title><![CDATA[Map, test, fix, comply: unveiling our unified approach to offensive security]]></title><link>https://www.yeswehack.com/en/blog/map-test-fix-comply-unified</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/map-test-fix-comply-unified</guid><pubDate>Tue, 31 Mar 2026 07:34:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #49 Secret Manager solution]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-solution-49</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-solution-49</guid><pubDate>Wed, 25 Mar 2026 08:35:00 GMT</pubDate></item><item><title><![CDATA[Continuous Pentesting with zero false positives: a fully managed, platform-driven approach]]></title><link>https://www.yeswehack.com/en/blog/continuous-pentesting-zero-false-positives</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/continuous-pentesting-zero-false-positives</guid><pubDate>Tue, 24 Mar 2026 07:39:00 GMT</pubDate></item><item><title><![CDATA[Open-source security testing: the Bug Bounty guide to code analysis]]></title><link>https://www.yeswehack.com/en/blog/open-source-guide-code-analysis</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/open-source-guide-code-analysis</guid><pubDate>Tue, 17 Mar 2026 08:10:00 GMT</pubDate></item><item><title><![CDATA[Introducing Autonomous Pentest: identify actively exploited vulnerabilities across your attack surface]]></title><link>https://www.yeswehack.com/en/blog/introducing-autonomous-pentest-identify-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/introducing-autonomous-pentest-identify-vulnerabilities</guid><pubDate>Thu, 12 Mar 2026 08:11:00 GMT</pubDate></item><item><title><![CDATA[‘We must learn how to use AI’: Wlayzz on future-proofing Bug Bounty and how a duplicate became his favourite discovery]]></title><link>https://www.yeswehack.com/en/blog/use-ai-wlayzz-future-proofing</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/use-ai-wlayzz-future-proofing</guid><pubDate>Mon, 09 Mar 2026 09:14:00 GMT</pubDate></item><item><title><![CDATA[Python pitfalls: Turning developer mistakes into vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/python-pitfalls-turning-developer-mistakes</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/python-pitfalls-turning-developer-mistakes</guid><pubDate>Fri, 27 Feb 2026 10:38:00 GMT</pubDate></item><item><title><![CDATA[Notepad++ hijack, pwning Claude Code, top web hacking techniques of 2025 – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/notepad-hijack-pwn-claude-code</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/notepad-hijack-pwn-claude-code</guid><pubDate>Mon, 23 Feb 2026 12:54:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #48 RubitMQ solution]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-solution-48</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-solution-48</guid><pubDate>Thu, 19 Feb 2026 08:17:00 GMT</pubDate></item><item><title><![CDATA[LLM bug hunters lack intuition, ‘security teams will consolidate visibility’ in 2026, EU Cyber Act vuln disclosure revisions – offsec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/llm-hunters-visibility-cyber-act</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/llm-hunters-visibility-cyber-act</guid><pubDate>Mon, 16 Feb 2026 12:48:00 GMT</pubDate></item><item><title><![CDATA[XML external entity: The ultimate Bug Bounty guide to exploiting XXE vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/xml-external-entity-guide-xxe</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/xml-external-entity-guide-xxe</guid><pubDate>Fri, 06 Feb 2026 17:36:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack report 2026: the trends, insights and strategic shifts shaping offensive security]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-report-2026-trends-security</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-report-2026-trends-security</guid><pubDate>Thu, 05 Feb 2026 14:57:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #47 APICrash solution]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-solution-47</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-solution-47</guid><pubDate>Wed, 14 Jan 2026 15:19:00 GMT</pubDate></item><item><title><![CDATA[‘A fraction of the pentest cost’: Lessons from an Asian telco’s Bug Bounty success]]></title><link>https://www.yeswehack.com/en/blog/fraction-pentest-asia-telco-story</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/fraction-pentest-asia-telco-story</guid><pubDate>Tue, 16 Dec 2025 09:23:00 GMT</pubDate></item><item><title><![CDATA[World Poker Tour and the Curry-Shah collab, in-flight exploits, does maths maketh the hunter? – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/poker-curry-maths-maketh-hunter</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/poker-curry-maths-maketh-hunter</guid><pubDate>Thu, 11 Dec 2025 13:22:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #46 Ghost whisper solution]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-solution-46</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-solution-46</guid><pubDate>Thu, 04 Dec 2025 08:36:00 GMT</pubDate></item><item><title><![CDATA[Android recon for Bug Bounty hunters: A complete guide from APK extraction to mapping attack surfaces]]></title><link>https://www.yeswehack.com/en/blog/android-recon-bug-bounty-guide</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/android-recon-bug-bounty-guide</guid><pubDate>Wed, 26 Nov 2025 16:57:00 GMT</pubDate></item><item><title><![CDATA[‘Bug Bounty helps us meet regulatory requirements ahead of time’: payments provider KOMOJU]]></title><link>https://www.yeswehack.com/en/blog/bounty-regulatory-payments-provider-komoju</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bounty-regulatory-payments-provider-komoju</guid><pubDate>Tue, 18 Nov 2025 09:21:00 GMT</pubDate></item><item><title><![CDATA[Cyber budgets still growing (but not fast enough), ‘AI and automation are operational imperatives’, the real-world impact of boosting Bug Bounty rewards – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/cyber-budgets-ai-automation-rewards-volume</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/cyber-budgets-ai-automation-rewards-volume</guid><pubDate>Mon, 10 Nov 2025 13:50:00 GMT</pubDate></item><item><title><![CDATA[The ultimate Bug Bounty guide to HTTP request smuggling vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/http-request-smuggling-guide-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/http-request-smuggling-guide-vulnerabilities</guid><pubDate>Thu, 30 Oct 2025 12:50:53 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #45 Chainfection solution]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-solution-45</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-solution-45</guid><pubDate>Wed, 29 Oct 2025 13:15:52 GMT</pubDate></item><item><title><![CDATA[MINDEF Launches Next Bug Bounty Programme with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/mindef-launches-next-bug-bounty-programme-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/mindef-launches-next-bug-bounty-programme-with-yeswehack</guid><pubDate>Tue, 28 Oct 2025 01:30:00 GMT</pubDate></item><item><title><![CDATA[Continuous threat exposure management series #4: Supercharging CTEM with Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/continuous-supercharging-ctem-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/continuous-supercharging-ctem-bug-bounty</guid><pubDate>Tue, 21 Oct 2025 12:01:00 GMT</pubDate></item><item><title><![CDATA[The minefield between syntaxes: exploiting syntax confusions in the wild]]></title><link>https://www.yeswehack.com/en/blog/syntax-confusion-ambiguous-parsing-exploits</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/syntax-confusion-ambiguous-parsing-exploits</guid><pubDate>Fri, 17 Oct 2025 11:30:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack marks first year of Bug Bounty partnership with Singapore government]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-marks-first-year-of-partnership-with-singapore-government-bug-bounty-programmes</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-marks-first-year-of-partnership-with-singapore-government-bug-bounty-programmes</guid><pubDate>Wed, 15 Oct 2025 07:00:00 GMT</pubDate></item><item><title><![CDATA[How to find SSTI, cache poisoning, business logic vulnerabilities: methodology tips from top Bug Bounty hunters]]></title><link>https://www.yeswehack.com/en/blog/ssti-cache-poisoning-logic-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ssti-cache-poisoning-logic-vulnerabilities</guid><pubDate>Tue, 07 Oct 2025 08:57:00 GMT</pubDate></item><item><title><![CDATA[Why ‘HTTP/1.1 must die’, Intel exploits, C# Random hack with no maths – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/http-1-intel-exploits-random</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/http-1-intel-exploits-random</guid><pubDate>Fri, 03 Oct 2025 10:52:00 GMT</pubDate></item><item><title><![CDATA[European Commission’s latest Bug Bounty tender won by YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/european-commission-tender-won-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/european-commission-tender-won-yeswehack</guid><pubDate>Thu, 02 Oct 2025 13:20:00 GMT</pubDate></item><item><title><![CDATA[Concurrency exploits: The ultimate Bug Bounty guide to exploiting race condition vulnerabilities in web applications]]></title><link>https://www.yeswehack.com/en/blog/ultimate-guide-race-condition-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ultimate-guide-race-condition-vulnerabilities</guid><pubDate>Fri, 26 Sep 2025 08:45:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #44 Hardware monitor write-up]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-44</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-44</guid><pubDate>Wed, 24 Sep 2025 13:41:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack authorised as a CVE Numbering Authority (CNA)]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-authorised-cve-numbering-authority</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-authorised-cve-numbering-authority</guid><pubDate>Tue, 23 Sep 2025 07:00:00 GMT</pubDate></item><item><title><![CDATA[‘The unpredictability and creativity of actual threat actors’: Energy giant NOV reaps the rewards of Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/threat-actors-energy-nov-rewards</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/threat-actors-energy-nov-rewards</guid><pubDate>Thu, 18 Sep 2025 13:54:00 GMT</pubDate></item><item><title><![CDATA[The rabhi route to root: Our all-time #1 hunter shares his Bug Bounty blueprint]]></title><link>https://www.yeswehack.com/en/blog/rabhi-root-bug-bounty-blueprint</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/rabhi-root-bug-bounty-blueprint</guid><pubDate>Tue, 16 Sep 2025 11:49:00 GMT</pubDate></item><item><title><![CDATA[Cross-site request forgery: The ultimate Bug Bounty guide to exploiting CSRF vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/ultimate-guide-csrf-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ultimate-guide-csrf-vulnerabilities</guid><pubDate>Fri, 12 Sep 2025 07:03:00 GMT</pubDate></item><item><title><![CDATA[‘We wanted a lot of researchers testing our scope’: Entrust’s experience scaling a Bug Bounty Program]]></title><link>https://www.yeswehack.com/en/blog/testing-scope-entrust-scaling-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/testing-scope-entrust-scaling-program</guid><pubDate>Thu, 11 Sep 2025 07:03:00 GMT</pubDate></item><item><title><![CDATA[US court ruling on Uber breach slammed, red teamers cautious on AI, OffSec offers ‘strategic edge’ – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/us-ruling-uber-offsec-edge</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/us-ruling-uber-offsec-edge</guid><pubDate>Wed, 10 Sep 2025 15:42:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack completes first-ever acquisition with purchase of Sekost, French cybersecurity audit specialist]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-completes-first-acquisition-sekost</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-completes-first-acquisition-sekost</guid><pubDate>Tue, 09 Sep 2025 05:30:43 GMT</pubDate></item><item><title><![CDATA[Putting the ‘success’ into Bug Bounty customer success management: Meet our head of CSM]]></title><link>https://www.yeswehack.com/en/blog/customer-success-management-head-csm</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/customer-success-management-head-csm</guid><pubDate>Fri, 29 Aug 2025 08:26:00 GMT</pubDate></item><item><title><![CDATA[Building an Android Bug Bounty lab: the ultimate guide to configuring emulators, real devices, proxies and other mobile hacking tools (featuring Magisk, Burp, Frida)]]></title><link>https://www.yeswehack.com/en/blog/android-lab-mobile-hacking-tools</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/android-lab-mobile-hacking-tools</guid><pubDate>Tue, 26 Aug 2025 11:39:24 GMT</pubDate></item><item><title><![CDATA[Nonce CSP bypass using disk cache, ‘quiet side channel’ for request smuggling, Amazon Q and the malicious pull request – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/csp-bypass-smuggling-amazon-q</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/csp-bypass-smuggling-amazon-q</guid><pubDate>Fri, 22 Aug 2025 07:07:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #43 CCTV Manager winners & writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-43</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-43</guid><pubDate>Thu, 21 Aug 2025 11:48:08 GMT</pubDate></item><item><title><![CDATA[SQLi: The ultimate Bug Bounty guide to exploiting SQL injection vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/vulnerability-vectors-sql-injection</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerability-vectors-sql-injection</guid><pubDate>Tue, 12 Aug 2025 11:46:00 GMT</pubDate></item><item><title><![CDATA[‘It was a revelation’: lemonoftroy’s origin story and hacking methodology]]></title><link>https://www.yeswehack.com/en/blog/revelation-lemonoftroy-origin-story-hacking</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/revelation-lemonoftroy-origin-story-hacking</guid><pubDate>Fri, 08 Aug 2025 09:15:00 GMT</pubDate></item><item><title><![CDATA[Continuous threat exposure management (CTEM) series #3: mobilisation and remediation]]></title><link>https://www.yeswehack.com/en/blog/ctem-series-mobilisation-remediation</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ctem-series-mobilisation-remediation</guid><pubDate>Thu, 31 Jul 2025 08:19:00 GMT</pubDate></item><item><title><![CDATA[‘I have the patience to spend long hours hacking through the night’: g4mb4 on his Bug Bounty career so far]]></title><link>https://www.yeswehack.com/en/blog/patience-hacking-g4mb4-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/patience-hacking-g4mb4-bug-bounty</guid><pubDate>Tue, 22 Jul 2025 10:31:00 GMT</pubDate></item><item><title><![CDATA[‘The most challenging part is the psychological one’ – leorac on the ups and downs of Bug Bounty hunting]]></title><link>https://www.yeswehack.com/en/blog/challenging-psychological-leorac-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/challenging-psychological-leorac-bug-bounty</guid><pubDate>Wed, 16 Jul 2025 10:32:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #42 - Hex Color Palette winners & writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-42</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-42</guid><pubDate>Fri, 11 Jul 2025 13:02:00 GMT</pubDate></item><item><title><![CDATA[Recon series recap: The ultimate guide to Bug Bounty reconnaissance and footprinting]]></title><link>https://www.yeswehack.com/en/blog/recon-series-recap-reconnaissance-footprinting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/recon-series-recap-reconnaissance-footprinting</guid><pubDate>Thu, 10 Jul 2025 08:26:00 GMT</pubDate></item><item><title><![CDATA[Chunked-body parsing flaws, making self-XSS great again, using HTTP redirect loops to achieve non-blind SSRFs – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/chunked-parsing-self-xss-http</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/chunked-parsing-self-xss-http</guid><pubDate>Wed, 09 Jul 2025 08:14:00 GMT</pubDate></item><item><title><![CDATA[‘Bug Bounty has become a security best practice’: Why Ferrero is sweet on crowdsourced testing]]></title><link>https://www.yeswehack.com/en/blog/security-best-practice-ferrero-crowdsourced</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/security-best-practice-ferrero-crowdsourced</guid><pubDate>Mon, 07 Jul 2025 08:33:00 GMT</pubDate></item><item><title><![CDATA[‘Feeling close to a critical vulnerability is incredibly addictive’ – YouTuber gregxsunday on the joys of Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/incredibly-addictive-gregxsunday-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/incredibly-addictive-gregxsunday-bug-bounty</guid><pubDate>Fri, 04 Jul 2025 05:51:00 GMT</pubDate></item><item><title><![CDATA[OpenAI VDP for bugs found by AI, CVE funding fears persist, ‘shift left’ towards vulnerability overload – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/openai-vdp-cve-shift-left</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/openai-vdp-cve-shift-left</guid><pubDate>Mon, 30 Jun 2025 08:21:00 GMT</pubDate></item><item><title><![CDATA[Flashback to the L’Oréal Live Bug Bounty: Watch last year’s highlights as anticipation builds for leHACK 2025]]></title><link>https://www.yeswehack.com/en/blog/flashback-loréal-bug-bounty-lehack-2025</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/flashback-loréal-bug-bounty-lehack-2025</guid><pubDate>Thu, 26 Jun 2025 07:59:00 GMT</pubDate></item><item><title><![CDATA[YesWeCaido: a new Caido plugin for tracking Bug Bounty Programs ]]></title><link>https://www.yeswehack.com/en/blog/yeswecaido-plugin-bug-bounty-programs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswecaido-plugin-bug-bounty-programs</guid><pubDate>Tue, 24 Jun 2025 14:38:00 GMT</pubDate></item><item><title><![CDATA[Ultimate double-clickjacking exploit, novel HTTP/2 request tunnelling techniques, when encryption makes matters worse – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/double-clickjacking-request-tunnelling-encryption</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/double-clickjacking-request-tunnelling-encryption</guid><pubDate>Fri, 20 Jun 2025 11:43:00 GMT</pubDate></item><item><title><![CDATA[‘Valuable for fast-growing, frequently updated platforms’: Gong OffSec lead on the merits of continuous, crowdsourced security testing]]></title><link>https://www.yeswehack.com/en/blog/gong-offsec-lead-crowdsourced-security</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/gong-offsec-lead-crowdsourced-security</guid><pubDate>Wed, 18 Jun 2025 11:45:00 GMT</pubDate></item><item><title><![CDATA[‘AI slop’ bug reports and outsourcing triage, OpenPGP.js signature-spoofing bug, race to combat zero-day exploits – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/ai-slop-openpgp-zero-day</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ai-slop-openpgp-zero-day</guid><pubDate>Mon, 16 Jun 2025 09:19:00 GMT</pubDate></item><item><title><![CDATA[Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive tools]]></title><link>https://www.yeswehack.com/en/blog/recon-wayback-machine-web-archive</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/recon-wayback-machine-web-archive</guid><pubDate>Fri, 13 Jun 2025 13:00:00 GMT</pubDate></item><item><title><![CDATA[Critical signature-spoofing vulnerability in OpenPGP.js hits the headlines]]></title><link>https://www.yeswehack.com/en/blog/critical-signature-spoofing-vulnerability-openpgpjs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/critical-signature-spoofing-vulnerability-openpgpjs</guid><pubDate>Wed, 11 Jun 2025 11:34:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #41 - Ruby treasure winners & writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-41</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-41</guid><pubDate>Wed, 04 Jun 2025 14:53:00 GMT</pubDate></item><item><title><![CDATA[Recon series #5: A hacker’s guide to Google dorking]]></title><link>https://www.yeswehack.com/en/blog/recon-hackers-guide-google-dorking</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/recon-hackers-guide-google-dorking</guid><pubDate>Tue, 27 May 2025 12:26:00 GMT</pubDate></item><item><title><![CDATA[Continuous threat exposure management (CTEM) series #2: vulnerability prioritisation and validation]]></title><link>https://www.yeswehack.com/en/blog/vulnerability-prioritisation-validation-ctem-2</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerability-prioritisation-validation-ctem-2</guid><pubDate>Tue, 20 May 2025 09:28:00 GMT</pubDate></item><item><title><![CDATA[‘Airborne’ AirPlay attacks, netting $64k from deleted files, triaging AI slop – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/airborne-airplay-deleted-files-slop</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/airborne-airplay-deleted-files-slop</guid><pubDate>Fri, 16 May 2025 13:00:00 GMT</pubDate></item><item><title><![CDATA[Beyond ‘../../’ - a practical guide to path traversal and arbitrary file read attacks]]></title><link>https://www.yeswehack.com/en/blog/practical-guide-path-traversal-attacks</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/practical-guide-path-traversal-attacks</guid><pubDate>Thu, 15 May 2025 12:51:00 GMT</pubDate></item><item><title><![CDATA[Tackling vulnerabilities at source: How to cut the rising cost of DevSecOps]]></title><link>https://www.yeswehack.com/en/blog/tackling-vulnerabilities-source-cost-devsecops</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/tackling-vulnerabilities-source-cost-devsecops</guid><pubDate>Fri, 09 May 2025 12:17:00 GMT</pubDate></item><item><title><![CDATA[UK retail cyber-attacks a ‘wake-up call’, SaaS overreliance ‘creating single points of failure’, calls for global regulatory alignment – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/uk-retail-attacks-saas-overreliance</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/uk-retail-attacks-saas-overreliance</guid><pubDate>Fri, 02 May 2025 09:45:00 GMT</pubDate></item><item><title><![CDATA[Middleware mayhem, Zoolander banter PoC, Malta to pardon hackers over ‘unfair’ charges – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/middleware-mayhem-zoolander-malta</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/middleware-mayhem-zoolander-malta</guid><pubDate>Wed, 30 Apr 2025 13:20:00 GMT</pubDate></item><item><title><![CDATA[New Dojo sandbox environment for creating Ruby CTF challenges]]></title><link>https://www.yeswehack.com/en/blog/dojo-sandbox-ruby-ctf-challenges</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-sandbox-ruby-ctf-challenges</guid><pubDate>Mon, 28 Apr 2025 14:30:00 GMT</pubDate></item><item><title><![CDATA[Recon series #4: Port scanning – uncovering attack vectors by revealing open ports and hidden services]]></title><link>https://www.yeswehack.com/en/blog/recon-port-scanning-attack-vectors</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/recon-port-scanning-attack-vectors</guid><pubDate>Fri, 25 Apr 2025 12:01:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #40 - Hacker profile winners & writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-40</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-40</guid><pubDate>Wed, 23 Apr 2025 14:31:00 GMT</pubDate></item><item><title><![CDATA[‘Continuous testing and a real-time understanding of my threat exposure’ – Ooredoo exec on the benefits of Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/continuous-testing-threat-exposure-ooredoo</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/continuous-testing-threat-exposure-ooredoo</guid><pubDate>Tue, 22 Apr 2025 08:36:00 GMT</pubDate></item><item><title><![CDATA[UK publishes proposals for NIS 2-equivalent Cyber Security and Resilience Bill]]></title><link>https://www.yeswehack.com/en/blog/uk-proposals-nis-resilience-bill</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/uk-proposals-nis-resilience-bill</guid><pubDate>Wed, 16 Apr 2025 11:59:00 GMT</pubDate></item><item><title><![CDATA[HTTP header hacks: basic and advanced exploit techniques explored]]></title><link>https://www.yeswehack.com/en/blog/http-header-exploitation</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/http-header-exploitation</guid><pubDate>Tue, 15 Apr 2025 12:05:00 GMT</pubDate></item><item><title><![CDATA[Spyware pact draws distinction between malicious and legitimate use of cyber-intrusion tools]]></title><link>https://www.yeswehack.com/en/blog/spyware-pact-malicious-legitimate-use</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/spyware-pact-malicious-legitimate-use</guid><pubDate>Thu, 10 Apr 2025 14:24:00 GMT</pubDate></item><item><title><![CDATA[Hacking GraphQL endpoints with introspection, query, mutation, batching attacks]]></title><link>https://www.yeswehack.com/en/blog/hacking-graphql-endpoints</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/hacking-graphql-endpoints</guid><pubDate>Tue, 08 Apr 2025 13:31:00 GMT</pubDate></item><item><title><![CDATA[EUCC cyber certification scheme enters early adopter phase after vulnerability disclosure rules issued]]></title><link>https://www.yeswehack.com/en/blog/eucc-certification-scheme-early-adopter</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/eucc-certification-scheme-early-adopter</guid><pubDate>Wed, 02 Apr 2025 12:00:00 GMT</pubDate></item><item><title><![CDATA[The art of payload obfuscation: how to mask malicious scripts and bypass defence mechanisms]]></title><link>https://www.yeswehack.com/en/blog/payload-obfuscation-techniques-guide</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/payload-obfuscation-techniques-guide</guid><pubDate>Thu, 27 Mar 2025 14:42:00 GMT</pubDate></item><item><title><![CDATA[Limitations are just an illusion – advanced server-side template exploitation with RCE everywhere]]></title><link>https://www.yeswehack.com/en/blog/server-side-template-injection-exploitation</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/server-side-template-injection-exploitation</guid><pubDate>Mon, 24 Mar 2025 09:06:00 GMT</pubDate></item><item><title><![CDATA[YouTube email leak exploit, Great ‘Wallbleed’ of China, Burp’s overlooked ‘best feature’ – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/youtube-wallbleed-burp-hacker-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/youtube-wallbleed-burp-hacker-roundup</guid><pubDate>Fri, 21 Mar 2025 10:28:00 GMT</pubDate></item><item><title><![CDATA[Mitigating AI cybersecurity risks with Bug Bounty Programs: A deep dive]]></title><link>https://www.yeswehack.com/en/blog/ai-cybersecurity-risks-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ai-cybersecurity-risks-bug-bounty</guid><pubDate>Wed, 19 Mar 2025 13:30:00 GMT</pubDate></item><item><title><![CDATA[Recon series #3: HTTP fingerprinting – sleuthing for a web application’s hidden vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/recon-series-http-fingerprinting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/recon-series-http-fingerprinting</guid><pubDate>Tue, 18 Mar 2025 14:58:00 GMT</pubDate></item><item><title><![CDATA[US House passes bill mandating vulnerability disclosure policies for federal contractors]]></title><link>https://www.yeswehack.com/en/blog/us-house-bill-vulnerability-disclosure</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/us-house-bill-vulnerability-disclosure</guid><pubDate>Tue, 11 Mar 2025 13:33:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #39 - Phishing winners & writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-39</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-39</guid><pubDate>Thu, 06 Mar 2025 14:57:28 GMT</pubDate></item><item><title><![CDATA[Junior devs ‘can’t actually code’, AI coding risks, security researchers decry inscrutable AI – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/devs-ai-coding-risks-researchers-decry</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/devs-ai-coding-risks-researchers-decry</guid><pubDate>Mon, 03 Mar 2025 11:13:00 GMT</pubDate></item><item><title><![CDATA[Recon Series #2: Subdomain enumeration – expand attack surfaces with active, passive techniques]]></title><link>https://www.yeswehack.com/en/blog/subdomain-enumeration-expand-attack-surface</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/subdomain-enumeration-expand-attack-surface</guid><pubDate>Thu, 20 Feb 2025 18:22:00 GMT</pubDate></item><item><title><![CDATA[Bounty Grid Boost: Ethical Hackers Invited to Strengthen the Security of the French Government’s Digital Services]]></title><link>https://www.yeswehack.com/en/blog/french-government-bounty-grid-boost</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/french-government-bounty-grid-boost</guid><pubDate>Mon, 17 Feb 2025 14:41:00 GMT</pubDate></item><item><title><![CDATA[Top web hacking techniques of 2024, McDelivery hijack, 4D SOTA jailbreak – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/web-hacking-techniques-mcdelivery-sota</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/web-hacking-techniques-mcdelivery-sota</guid><pubDate>Thu, 13 Feb 2025 12:12:00 GMT</pubDate></item><item><title><![CDATA[XSS attacks and exploitation: The ultimate guide to cross-site scripting]]></title><link>https://www.yeswehack.com/en/blog/xss-attacks-exploitation-ultimate-guide</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/xss-attacks-exploitation-ultimate-guide</guid><pubDate>Tue, 11 Feb 2025 12:57:55 GMT</pubDate></item><item><title><![CDATA[Vulnerability management reboot sought, CISOs more influential in boardroom, Trump’s cyber overhaul – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/vulnerability-management-reboot-cisos-trump</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerability-management-reboot-cisos-trump</guid><pubDate>Fri, 07 Feb 2025 15:49:00 GMT</pubDate></item><item><title><![CDATA[CVE surge: Why the record rise in new vulnerabilities?]]></title><link>https://www.yeswehack.com/en/blog/cve-surge-record-jump-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/cve-surge-record-jump-vulnerabilities</guid><pubDate>Tue, 28 Jan 2025 15:49:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #38 - Xmas wishlist, winners and writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-38</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-38</guid><pubDate>Thu, 23 Jan 2025 14:56:31 GMT</pubDate></item><item><title><![CDATA[DORA now in force: 5 ways YesWeHack’s offensive security platform can bolster your Digital Operational Resilience Act compliance]]></title><link>https://www.yeswehack.com/en/blog/dora-offensive-security-platform-compliance</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dora-offensive-security-platform-compliance</guid><pubDate>Wed, 22 Jan 2025 08:43:00 GMT</pubDate></item><item><title><![CDATA[The YesWeHack Bug Bounty Report 2025]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-bug-bounty-report-2025</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-bug-bounty-report-2025</guid><pubDate>Tue, 14 Jan 2025 11:41:00 GMT</pubDate></item><item><title><![CDATA[Recon Series #1: Discovering and mapping hidden endpoints and parameters to expand attack surfaces]]></title><link>https://www.yeswehack.com/en/blog/discover-map-hidden-endpoints-parameters</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/discover-map-hidden-endpoints-parameters</guid><pubDate>Thu, 09 Jan 2025 12:00:00 GMT</pubDate></item><item><title><![CDATA[‘There are a lot of vulnerabilities on public programs’: pwnii’s Bug Bounty journey so far]]></title><link>https://www.yeswehack.com/en/blog/vulnerabilities-pwnii-bug-bounty-journey</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerabilities-pwnii-bug-bounty-journey</guid><pubDate>Mon, 06 Jan 2025 12:03:00 GMT</pubDate></item><item><title><![CDATA[‘Hacking is essentially about curiosity’: Blaklis on the art and science of Bug Bounty hunting]]></title><link>https://www.yeswehack.com/en/blog/blaklis-art-science-bug-bounty-hunting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/blaklis-art-science-bug-bounty-hunting</guid><pubDate>Thu, 19 Dec 2024 08:18:00 GMT</pubDate></item><item><title><![CDATA[DOMPurify bypasses, prompt injecting ChatGPT to shell, AI fuzz finds – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/dompurify-bypasses-chatgpt-ai-fuzz</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dompurify-bypasses-chatgpt-ai-fuzz</guid><pubDate>Mon, 16 Dec 2024 14:36:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #37 - Hacker Forum winners and writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-37</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-37</guid><pubDate>Fri, 13 Dec 2024 10:39:38 GMT</pubDate></item><item><title><![CDATA[‘My best attribute is persistence – technical skills you can learn’: drak3hft7’s Bug Bounty story so far]]></title><link>https://www.yeswehack.com/en/blog/attribute-persistence-drak3hft7-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/attribute-persistence-drak3hft7-bug-bounty</guid><pubDate>Wed, 11 Dec 2024 09:24:00 GMT</pubDate></item><item><title><![CDATA[Clock ticking on Cyber Resilience Act compliance, Bug Bounty forecasts, intriguing CISA red team find – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/cra-compliance-bug-bounty-forecasts</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/cra-compliance-bug-bounty-forecasts</guid><pubDate>Mon, 09 Dec 2024 11:33:00 GMT</pubDate></item><item><title><![CDATA[‘Collaboration helped me become successful’: Nagli on becoming a world-renowned Bug Bounty hunter]]></title><link>https://www.yeswehack.com/en/blog/collaboration-nagli-bug-bounty-hunter</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/collaboration-nagli-bug-bounty-hunter</guid><pubDate>Mon, 02 Dec 2024 12:31:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #11 – Master Signed Token Exploits with SignSaboteur]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-signsaboteur-burpsuite-extension</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-signsaboteur-burpsuite-extension</guid><pubDate>Wed, 27 Nov 2024 14:00:00 GMT</pubDate></item><item><title><![CDATA[Cyber Resilience Act: compliance countdown set to start for EU law focused on eliminating vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/cyber-resilience-act-compliance-countdown</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/cyber-resilience-act-compliance-countdown</guid><pubDate>Mon, 25 Nov 2024 09:00:00 GMT</pubDate></item><item><title><![CDATA[Attack surface discovery: mapping your exposed vectors with continuous threat exposure management (CTEM series #1)]]></title><link>https://www.yeswehack.com/en/blog/attack-surface-discovery-vectors-ctem</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/attack-surface-discovery-vectors-ctem</guid><pubDate>Fri, 22 Nov 2024 10:55:00 GMT</pubDate></item><item><title><![CDATA[New tool for finding mutated XSS, $20k Chromium sandbox escape, Live bug bounty results from Ekoparty – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/Mutated-xss-chromium-sandbox-ekoparty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/Mutated-xss-chromium-sandbox-ekoparty</guid><pubDate>Mon, 18 Nov 2024 14:02:00 GMT</pubDate></item><item><title><![CDATA[‘The collective knowledge ATG gets is huge’: cyber chief on Betting brand’s Bug Bounty story]]></title><link>https://www.yeswehack.com/en/blog/collective-knowledge-atg-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/collective-knowledge-atg-bug-bounty</guid><pubDate>Wed, 13 Nov 2024 08:35:00 GMT</pubDate></item><item><title><![CDATA[NIS 2 in force, Cyber Resilience Act adopted, CISA hails VDP impact – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/nis-2-cisa-vdp-offsec-cisos</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/nis-2-cisa-vdp-offsec-cisos</guid><pubDate>Mon, 11 Nov 2024 08:36:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #36 - Shell Escape winners and writeup]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-36</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-36</guid><pubDate>Fri, 08 Nov 2024 09:00:00 GMT</pubDate></item><item><title><![CDATA[‘Happy hunters equal happy customers and vice versa’: YesWeHack vulnerability triage chief Adrien Jeanneau on creating a virtuous Bug Bounty circle]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-vulnerability-triage-adrien-jeanneau</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-vulnerability-triage-adrien-jeanneau</guid><pubDate>Thu, 07 Nov 2024 08:36:00 GMT</pubDate></item><item><title><![CDATA[Dom-Explorer tool launched to reveal how browsers parse HTML and find mutated XSS vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/dom-explorer-tool-parse-html</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dom-explorer-tool-parse-html</guid><pubDate>Mon, 04 Nov 2024 12:47:00 GMT</pubDate></item><item><title><![CDATA[‘I like Android apps and open-source code’: HakuPiku on Bug Bounty, CTFs and his favourite targets]]></title><link>https://www.yeswehack.com/en/blog/android-apps-hakupiku-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/android-apps-hakupiku-bug-bounty</guid><pubDate>Mon, 28 Oct 2024 12:48:00 GMT</pubDate></item><item><title><![CDATA[‘More efficient than a pentest and it generates trust’: TeamViewer’s Bug Bounty story so far]]></title><link>https://www.yeswehack.com/en/blog/efficient-pentest-teamviewer-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/efficient-pentest-teamviewer-bug-bounty</guid><pubDate>Thu, 24 Oct 2024 02:00:00 GMT</pubDate></item><item><title><![CDATA[White-box penetration testing: How to debug for JavaScript vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/white-box-debug-JavaScript-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/white-box-debug-JavaScript-vulnerabilities</guid><pubDate>Tue, 22 Oct 2024 14:32:00 GMT</pubDate></item><item><title><![CDATA[Tackling tech sprawl, CISO burnout, NIS 2 now enforceable – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/tech-sprawl-nis-2-offsec-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/tech-sprawl-nis-2-offsec-roundup</guid><pubDate>Fri, 18 Oct 2024 10:13:00 GMT</pubDate></item><item><title><![CDATA[The NIS 2 Directive is now enforceable: What are the implications for vulnerability management?]]></title><link>https://www.yeswehack.com/en/blog/nis-2-directive-vulnerability-management</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/nis-2-directive-vulnerability-management</guid><pubDate>Thu, 17 Oct 2024 09:07:00 GMT</pubDate></item><item><title><![CDATA[Partial SolarWinds reprieve, CrowdStrike lessons, LLM kryptonite – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/solarwinds-crowdStrike-llm-ciso-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/solarwinds-crowdStrike-llm-ciso-roundup</guid><pubDate>Wed, 16 Oct 2024 15:00:29 GMT</pubDate></item><item><title><![CDATA[YesWeHack and Ferrero inaugurate Italy’s first live hacking event]]></title><link>https://www.yeswehack.com/en/blog/ferrero-live-hacking-event</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ferrero-live-hacking-event</guid><pubDate>Wed, 16 Oct 2024 14:58:00 GMT</pubDate></item><item><title><![CDATA[Top 5 hacking tools for white-box pentesting]]></title><link>https://www.yeswehack.com/en/blog/5-tools-white-box-pentesting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/5-tools-white-box-pentesting</guid><pubDate>Thu, 10 Oct 2024 13:28:06 GMT</pubDate></item><item><title><![CDATA[Web timing attacks, Apache HTTP confusion attacks, email parsing discrepancies – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/web-timing-attacks-http-server</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/web-timing-attacks-http-server</guid><pubDate>Mon, 30 Sep 2024 15:25:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #35 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-35</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-35</guid><pubDate>Wed, 25 Sep 2024 12:17:35 GMT</pubDate></item><item><title><![CDATA[NIS 2 in brief, security tech hype cycle, Italy’s first ever live Bug Bounty – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/nis-2-hype-cycle-italy</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/nis-2-hype-cycle-italy</guid><pubDate>Fri, 20 Sep 2024 12:41:00 GMT</pubDate></item><item><title><![CDATA[White-box penetration testing: Debugging for Python vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/penetration-testing-debugging-python-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/penetration-testing-debugging-python-vulnerabilities</guid><pubDate>Thu, 12 Sep 2024 12:01:46 GMT</pubDate></item><item><title><![CDATA[Hacking for €10k rewards and a secure open source ecosystem: Bug Bounty opportunities from the Sovereign Tech Fund]]></title><link>https://www.yeswehack.com/en/blog/open-source-sovereign-tech-fund</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/open-source-sovereign-tech-fund</guid><pubDate>Wed, 04 Sep 2024 12:13:00 GMT</pubDate></item><item><title><![CDATA[ORM leaks, CSRF is alive, lockpicking lessons – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/orm-leaks-csrf-hacker-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/orm-leaks-csrf-hacker-roundup</guid><pubDate>Wed, 14 Aug 2024 13:56:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #34 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-34</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-34</guid><pubDate>Mon, 05 Aug 2024 15:19:47 GMT</pubDate></item><item><title><![CDATA[Hack Me I’m Famous #2: Louis Vuitton sets trend with first live hacking event in luxury fashion sector]]></title><link>https://www.yeswehack.com/en/blog/louis-vuitton-live-hacking-event</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/louis-vuitton-live-hacking-event</guid><pubDate>Tue, 30 Jul 2024 10:20:05 GMT</pubDate></item><item><title><![CDATA[White-box penetration testing with Xdebug: Debugging for PHP vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/white-box-penetration-testing-xdebug</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/white-box-penetration-testing-xdebug</guid><pubDate>Fri, 19 Jul 2024 15:29:00 GMT</pubDate></item><item><title><![CDATA[L'Oréal lauds live Bug Bounty success at LeHack 2024]]></title><link>https://www.yeswehack.com/en/blog/loreal-live-hacking-event-lehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/loreal-live-hacking-event-lehack</guid><pubDate>Fri, 12 Jul 2024 12:59:00 GMT</pubDate></item><item><title><![CDATA[Sam Curry modem masterclass, PHP threat to Windows Servers, Calls for AI safety Bug Bounties – ethical hacker news roundup]]></title><link>https://www.yeswehack.com/en/blog/sam-curry-php-hacker-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/sam-curry-php-hacker-roundup</guid><pubDate>Tue, 09 Jul 2024 13:33:00 GMT</pubDate></item><item><title><![CDATA[Critical infrastructure-level protections for YesWeHack cloud after switch to SecNumCloud-qualified service]]></title><link>https://www.yeswehack.com/en/blog/critical-infrastructure-yeswehack-cloud-secnumcloud</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/critical-infrastructure-yeswehack-cloud-secnumcloud</guid><pubDate>Thu, 04 Jul 2024 10:11:00 GMT</pubDate></item><item><title><![CDATA[Apple declines to pay Kaspersky vuln reward, Bug Bounty ‘extortion’ dispute, Microsoft Recall backlash – OffSec roundup for CISOs]]></title><link>https://www.yeswehack.com/en/blog/apple-kaspersky-microsoft-ciso-roundup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/apple-kaspersky-microsoft-ciso-roundup</guid><pubDate>Tue, 02 Jul 2024 13:06:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #33 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-33</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-33</guid><pubDate>Tue, 25 Jun 2024 14:56:09 GMT</pubDate></item><item><title><![CDATA[Countdown to NIS 2 compliance: Key insights and implications for your SecOps strategy]]></title><link>https://www.yeswehack.com/en/blog/nis-2-ctem-vulnerability-compliance</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/nis-2-ctem-vulnerability-compliance</guid><pubDate>Tue, 18 Jun 2024 08:59:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack lève 26 millions d'euros pour accélérer sa croissance et son expansion internationale]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-leve-26-million-d-euros-en-serie-C</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-leve-26-million-d-euros-en-serie-C</guid><pubDate>Tue, 11 Jun 2024 06:48:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack raises 26 million euros to accelerate its growth and international expansion]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-fundraising-26-million-euros-series-C</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-fundraising-26-million-euros-series-C</guid><pubDate>Tue, 11 Jun 2024 06:29:00 GMT</pubDate></item><item><title><![CDATA[‘Our businesses are reassured that we’re protecting their activities’: Les Mousquetaires CISO on leveraging live hacking events]]></title><link>https://www.yeswehack.com/en/blog/les-mousquetaires-ciso-hacking-events</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/les-mousquetaires-ciso-hacking-events</guid><pubDate>Thu, 06 Jun 2024 07:55:00 GMT</pubDate></item><item><title><![CDATA[‘No cheaper way of getting security testing’: financial services Bug Bounty success story]]></title><link>https://www.yeswehack.com/en/blog/security-testing-bug-bounty-financial</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/security-testing-bug-bounty-financial</guid><pubDate>Tue, 28 May 2024 07:34:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #32 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-32</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-32</guid><pubDate>Fri, 17 May 2024 08:23:00 GMT</pubDate></item><item><title><![CDATA[UK PSTI Act: ‘World first’ IoT security rules offer reminder of VDP virtues]]></title><link>https://www.yeswehack.com/en/blog/Uk-psti-act-vdp-virtues</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/Uk-psti-act-vdp-virtues</guid><pubDate>Fri, 10 May 2024 10:35:00 GMT</pubDate></item><item><title><![CDATA[‘An efficient way to uncover vulnerabilities’: Doctolib's five years in Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/doctolib-five-years-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/doctolib-five-years-bug-bounty</guid><pubDate>Tue, 30 Apr 2024 07:46:00 GMT</pubDate></item><item><title><![CDATA[Bug Bounty hunters mount impressive sprint finish to Caisse des Dépôts marathon]]></title><link>https://www.yeswehack.com/en/blog/bug-hunters-caisse-depots-marathon</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-hunters-caisse-depots-marathon</guid><pubDate>Fri, 26 Apr 2024 09:50:56 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #31 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-31</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners-31</guid><pubDate>Tue, 16 Apr 2024 12:55:42 GMT</pubDate></item><item><title><![CDATA[‘Hunters’ biggest mistake? Expecting immediate results’: ‘RL’ on building a Bug Bounty career]]></title><link>https://www.yeswehack.com/en/blog/RL-building-bug-bounty-career</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/RL-building-bug-bounty-career</guid><pubDate>Fri, 22 Mar 2024 08:46:00 GMT</pubDate></item><item><title><![CDATA[‘Large amount of knowhow’: Why Thüringer Aufbaubank harnesses Bug Bounty to bolster customer trust]]></title><link>https://www.yeswehack.com/en/blog/knowhow-bug-bounty-thuringer-aufbaubank</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/knowhow-bug-bounty-thuringer-aufbaubank</guid><pubDate>Thu, 21 Mar 2024 08:37:00 GMT</pubDate></item><item><title><![CDATA[‘I stay on targets for a long, long time’: Chackal and Serizao on passion, persistence and partnerships in Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-targets-chackal-serizao</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-targets-chackal-serizao</guid><pubDate>Wed, 13 Mar 2024 09:06:00 GMT</pubDate></item><item><title><![CDATA[Dojo challenge #30 winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-ctf-challenge-winners</guid><pubDate>Tue, 12 Mar 2024 12:38:36 GMT</pubDate></item><item><title><![CDATA[‘Adapt payloads to your targets’: Brumens’ Bug Bounty tips for newbies]]></title><link>https://www.yeswehack.com/en/blog/brumens-bug-bounty-tips-newbies</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/brumens-bug-bounty-tips-newbies</guid><pubDate>Thu, 07 Mar 2024 09:07:00 GMT</pubDate></item><item><title><![CDATA[How to write an effective Bug Bounty report]]></title><link>https://www.yeswehack.com/en/blog/write-effective-bug-bounty-reports</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/write-effective-bug-bounty-reports</guid><pubDate>Wed, 06 Mar 2024 14:13:11 GMT</pubDate></item><item><title><![CDATA[‘Be curious, be persistent’: Icare on thriving as a Bug Bounty hunter]]></title><link>https://www.yeswehack.com/en/blog/Icare-thriving-bug-bounty-hunter</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/Icare-thriving-bug-bounty-hunter</guid><pubDate>Fri, 01 Mar 2024 09:07:00 GMT</pubDate></item><item><title><![CDATA[‘We opted for Bug Bounty for agility reasons’: European Community of Alsace CISO]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-european-alsace-ciso</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-european-alsace-ciso</guid><pubDate>Tue, 27 Feb 2024 09:09:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack hunter achievements: Unveiling the Galactic Guardians series]]></title><link>https://www.yeswehack.com/en/blog/new-hacker-achievements</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/new-hacker-achievements</guid><pubDate>Fri, 23 Feb 2024 14:44:51 GMT</pubDate></item><item><title><![CDATA[‘Proficiency takes time’: Xel on his best Bug Bounty finds and the primacy of patience in ethical hacking]]></title><link>https://www.yeswehack.com/en/blog/Xel-ethical-hacking-interview-advice</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/Xel-ethical-hacking-interview-advice</guid><pubDate>Thu, 22 Feb 2024 09:12:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack unveils workflow-friendly revamp of user interface]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-workflow-friendly-user-interface</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-workflow-friendly-user-interface</guid><pubDate>Mon, 19 Feb 2024 09:13:00 GMT</pubDate></item><item><title><![CDATA[‘The red team’s security skills have increased considerably’: Bug Bounty at Bancolombia]]></title><link>https://www.yeswehack.com/en/blog/red-team-bancolombia-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/red-team-bancolombia-bug-bounty</guid><pubDate>Thu, 15 Feb 2024 09:08:00 GMT</pubDate></item><item><title><![CDATA[Smart Automation With Burp Suite]]></title><link>https://www.yeswehack.com/en/blog/smart-automation-with-burp-suite</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/smart-automation-with-burp-suite</guid><pubDate>Wed, 14 Feb 2024 13:11:50 GMT</pubDate></item><item><title><![CDATA[‘The level of automation right now is crazy’: GoDiego on why post-auth vulnerabilities are the future of Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/automation-godiego-future-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/automation-godiego-future-bug-bounty</guid><pubDate>Tue, 13 Feb 2024 09:09:00 GMT</pubDate></item><item><title><![CDATA[US SEC cyber rules, SolarWinds CISO charges: How a unified OffSec strategy can enhance your SEC disclosures]]></title><link>https://www.yeswehack.com/en/blog/sec-cyber-rules-solarwinds-offsec</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/sec-cyber-rules-solarwinds-offsec</guid><pubDate>Thu, 08 Feb 2024 09:14:00 GMT</pubDate></item><item><title><![CDATA[Unveiling Dojo v2: Our new CTF and realistic challenge-building framework]]></title><link>https://www.yeswehack.com/en/blog/unveiling-dojo-v2-our-new-ctf-and-realistic-challenge-building-framework</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/unveiling-dojo-v2-our-new-ctf-and-realistic-challenge-building-framework</guid><pubDate>Wed, 07 Feb 2024 14:33:54 GMT</pubDate></item><item><title><![CDATA['ROI is easy to justify’: Bug Bounty success story from a luxury goods retailer ]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-success-story-luxury-goods-retailer</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-success-story-luxury-goods-retailer</guid><pubDate>Thu, 01 Feb 2024 03:00:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack announces CREST accreditation for pentesting services]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-crest-accreditation-pentesting-services</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-crest-accreditation-pentesting-services</guid><pubDate>Mon, 29 Jan 2024 11:41:00 GMT</pubDate></item><item><title><![CDATA[Festive Dojo challenge #29: SantaLock winners revealed!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-29-santalock</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-29-santalock</guid><pubDate>Wed, 03 Jan 2024 15:00:22 GMT</pubDate></item><item><title><![CDATA[9 rules for a successful first-time Bug Bounty Program]]></title><link>https://www.yeswehack.com/en/blog/9-rules-for-a-successful-first-time-bug-bounty-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/9-rules-for-a-successful-first-time-bug-bounty-program</guid><pubDate>Thu, 14 Dec 2023 13:23:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack secures ISO/IEC 27017 certification to boost trust in our cloud-based services]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-iso-iec-27017-certification-cloud-trust</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-iso-iec-27017-certification-cloud-trust</guid><pubDate>Thu, 07 Dec 2023 08:59:52 GMT</pubDate></item><item><title><![CDATA["Triage was world class": Bug Bounty success story from risk-management giant DNV ]]></title><link>https://www.yeswehack.com/en/blog/triage-was-world-class-bug-bounty-success-story-from-risk-management-giant-dnv</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/triage-was-world-class-bug-bounty-success-story-from-risk-management-giant-dnv</guid><pubDate>Tue, 05 Dec 2023 13:15:00 GMT</pubDate></item><item><title><![CDATA[Introducing the YesWeHack Advent Calendar: 24 Days of Challenges and Festive Fun!]]></title><link>https://www.yeswehack.com/en/blog/introducing-the-yeswehack-advent-calendar-24-days-of-challenges-and-festive-fun</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/introducing-the-yeswehack-advent-calendar-24-days-of-challenges-and-festive-fun</guid><pubDate>Fri, 01 Dec 2023 13:15:00 GMT</pubDate></item><item><title><![CDATA[Busting Bug Bounty misconceptions]]></title><link>https://www.yeswehack.com/en/blog/busting-bug-bounty-misconceptions</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/busting-bug-bounty-misconceptions</guid><pubDate>Thu, 16 Nov 2023 13:15:00 GMT</pubDate></item><item><title><![CDATA[How Bug Bounty and Attack Surface Management can help you comply with the Digital Operational Resilience Act’s upcoming requirements ]]></title><link>https://www.yeswehack.com/en/blog/how-bug-bounty-and-attack-surface-management-can-help-you-comply-with-the-digital-operational</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-bug-bounty-and-attack-surface-management-can-help-you-comply-with-the-digital-operational</guid><pubDate>Thu, 16 Nov 2023 10:12:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #28 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-28-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-28-winners</guid><pubDate>Tue, 14 Nov 2023 15:47:54 GMT</pubDate></item><item><title><![CDATA[Continuous Threat Exposure Management: Unify your Offsec Strategy with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/continuous-threat-exposure-management-unify-your-offsec-strategy-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/continuous-threat-exposure-management-unify-your-offsec-strategy-with-yeswehack</guid><pubDate>Thu, 09 Nov 2023 08:31:27 GMT</pubDate></item><item><title><![CDATA[‘YesWeHack adapted to our needs’: The Bug Bounty story so far for connected health pioneer Withings]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-bug-bounty-story-connected-health-pioneer-withings</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-bug-bounty-story-connected-health-pioneer-withings</guid><pubDate>Thu, 26 Oct 2023 07:08:12 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #10: Hackvertor – unleashing the power of Burp Suite]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-10-Hackvertor</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-10-Hackvertor</guid><pubDate>Wed, 11 Oct 2023 11:54:42 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #27 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-27-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-27-winners</guid><pubDate>Mon, 09 Oct 2023 13:27:00 GMT</pubDate></item><item><title><![CDATA[Firefly v1.1.0: A smart black-box fuzzer for testing web applications]]></title><link>https://www.yeswehack.com/en/blog/firefly-v1-1-0-a-smart-black-box-fuzzer-for-testing-web-applications</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/firefly-v1-1-0-a-smart-black-box-fuzzer-for-testing-web-applications</guid><pubDate>Thu, 14 Sep 2023 13:00:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #26 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-26-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-26-winners</guid><pubDate>Mon, 04 Sep 2023 12:14:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #9 – Use BCheck to improve vulnerability scanning]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-9-use-bcheck-to-improve-vulnerability-scanning</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-9-use-bcheck-to-improve-vulnerability-scanning</guid><pubDate>Tue, 01 Aug 2023 13:18:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #25 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-25-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-25-winners</guid><pubDate>Thu, 27 Jul 2023 12:26:00 GMT</pubDate></item><item><title><![CDATA[LeHACK recap: hunters push boundaries at YesWeHack Live Bug Bounty with Red Cross and Les Mousquetaires]]></title><link>https://www.yeswehack.com/en/blog/lehack-yeswehack-live-bug-bounty-with-red-cross-and-les-mousquetaires</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/lehack-yeswehack-live-bug-bounty-with-red-cross-and-les-mousquetaires</guid><pubDate>Tue, 11 Jul 2023 13:11:00 GMT</pubDate></item><item><title><![CDATA[Web Application Black-Box Testing]]></title><link>https://www.yeswehack.com/en/blog/black-box-testing-techniques-web-application</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/black-box-testing-techniques-web-application</guid><pubDate>Thu, 06 Jul 2023 14:07:00 GMT</pubDate></item><item><title><![CDATA[How compliance will increasingly drive adoption of Bug Bounty Programs – YesWeHack at Stockholm cyber-defense event]]></title><link>https://www.yeswehack.com/en/blog/compliance-bug-bounty-programs-yeswehack-at-stockholm-cyber-defense-event</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/compliance-bug-bounty-programs-yeswehack-at-stockholm-cyber-defense-event</guid><pubDate>Fri, 23 Jun 2023 14:43:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #24 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-24-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-24-winners</guid><pubDate>Mon, 19 Jun 2023 12:49:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack integrates the prestigious French Tech 2030 program]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-integrates-the-prestigious-french-tech-2030-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-integrates-the-prestigious-french-tech-2030-program</guid><pubDate>Thu, 15 Jun 2023 14:48:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #20 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-20-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-20-winners</guid><pubDate>Tue, 06 Jun 2023 13:37:00 GMT</pubDate></item><item><title><![CDATA[‘Start small – but start now!’ Inside Orange’s Bug Bounty journey with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/start-small-but-start-now-inside-oranges-bug-bounty-journey-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/start-small-but-start-now-inside-oranges-bug-bounty-journey-with-yeswehack</guid><pubDate>Mon, 05 Jun 2023 11:35:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #23 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-23-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-23-winners</guid><pubDate>Mon, 15 May 2023 12:59:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #8 – Perform Advanced Fuzzing With Turbo Intruder]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-8-advanced-fuzzing-turbo-intruder</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-8-advanced-fuzzing-turbo-intruder</guid><pubDate>Wed, 03 May 2023 14:13:00 GMT</pubDate></item><item><title><![CDATA[Raising Awareness Among Development Teams: Hack Day with Scania and YesWeHack in Stockholm]]></title><link>https://www.yeswehack.com/en/blog/hack-day-with-scania-and-yeswehack-in-stockholm</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/hack-day-with-scania-and-yeswehack-in-stockholm</guid><pubDate>Thu, 27 Apr 2023 14:54:00 GMT</pubDate></item><item><title><![CDATA[Navigating the Waters of Bug Bounty: Lessons Learned from Brittany Ferries’ Live Event]]></title><link>https://www.yeswehack.com/en/blog/navigating-the-waters-of-bug-bounty-lessons-learned-from-brittany-ferries-live-event</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/navigating-the-waters-of-bug-bounty-lessons-learned-from-brittany-ferries-live-event</guid><pubDate>Tue, 18 Apr 2023 15:00:00 GMT</pubDate></item><item><title><![CDATA[DOJO Challenge #22 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-22-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-22-winners</guid><pubDate>Fri, 07 Apr 2023 08:52:00 GMT</pubDate></item><item><title><![CDATA[Telenor Sweden uses ethical hackers to dial-up cybersecurity to the max]]></title><link>https://www.yeswehack.com/en/blog/telenor-sweden-to-use-ethical-hackers-to-dial-up-cybersecurity-to-the-max-in-partnership-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/telenor-sweden-to-use-ethical-hackers-to-dial-up-cybersecurity-to-the-max-in-partnership-with-yeswehack</guid><pubDate>Fri, 10 Mar 2023 10:36:00 GMT</pubDate></item><item><title><![CDATA[Ooredoo Launches New Cyber-Security Program to Upgrade Security Practices and Enhance Cyber-Security]]></title><link>https://www.yeswehack.com/en/blog/ooredoo-launches-new-cyber-security-program-to-upgrade-security-practices-and-enhance-cyber-security</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ooredoo-launches-new-cyber-security-program-to-upgrade-security-practices-and-enhance-cyber-security</guid><pubDate>Tue, 28 Feb 2023 16:14:00 GMT</pubDate></item><item><title><![CDATA[Server side prototype pollution, how to detect and exploit]]></title><link>https://www.yeswehack.com/en/blog/server-side-prototype-pollution-how-to-detect-and-exploit</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/server-side-prototype-pollution-how-to-detect-and-exploit</guid><pubDate>Wed, 15 Feb 2023 16:19:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #21 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-21-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-21-winners</guid><pubDate>Tue, 14 Feb 2023 14:20:00 GMT</pubDate></item><item><title><![CDATA[Firefly: a smart black-box fuzzer for web applications testing]]></title><link>https://www.yeswehack.com/en/blog/firefly-smart-black-box-fuzzer-web-applications</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/firefly-smart-black-box-fuzzer-web-applications</guid><pubDate>Fri, 10 Feb 2023 16:29:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #7: How HaE Burp Suite extension can help you in your daily hunting session]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-7-how-hae-burp-suite-extension-help-you-daily-hunting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-7-how-hae-burp-suite-extension-help-you-daily-hunting</guid><pubDate>Wed, 18 Jan 2023 16:48:00 GMT</pubDate></item><item><title><![CDATA[A sneak peek into Open-Xchange’s public Bug Bounty programs]]></title><link>https://www.yeswehack.com/en/blog/a-sneak-peek-into-open-xchange-public-bug-bounty-programs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/a-sneak-peek-into-open-xchange-public-bug-bounty-programs</guid><pubDate>Wed, 18 Jan 2023 16:37:00 GMT</pubDate></item><item><title><![CDATA[Vulnerability Disclosure Policy as a first step of GfK’s crowdsourced security strategy]]></title><link>https://www.yeswehack.com/en/blog/vdp-as-a-first-step-of-gfk-crowdsourced-security-strategy</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vdp-as-a-first-step-of-gfk-crowdsourced-security-strategy</guid><pubDate>Wed, 11 Jan 2023 16:56:00 GMT</pubDate></item><item><title><![CDATA[Exploring JavaScript's exploits: A deep dive into XSS vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/javascript-language-made-for-bugs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/javascript-language-made-for-bugs</guid><pubDate>Thu, 08 Dec 2022 08:25:00 GMT</pubDate></item><item><title><![CDATA[Indonesia’s Largest Fintech OVO kicks off its Public Bug Bounty program on YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/ovo-kicks-off-public-bug-bounty-program-on-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ovo-kicks-off-public-bug-bounty-program-on-yeswehack</guid><pubDate>Mon, 07 Nov 2022 08:21:00 GMT</pubDate></item><item><title><![CDATA[Turnkey VDP Open Source: making a difference in enhancing cybersecurity as a “public good”]]></title><link>https://www.yeswehack.com/en/blog/turnkey-vdp-open-source</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/turnkey-vdp-open-source</guid><pubDate>Tue, 25 Oct 2022 08:27:00 GMT</pubDate></item><item><title><![CDATA[Web application firewall bypass]]></title><link>https://www.yeswehack.com/en/blog/web-application-firewall-bypass</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/web-application-firewall-bypass</guid><pubDate>Tue, 11 Oct 2022 13:55:00 GMT</pubDate></item><item><title><![CDATA[Walk me through Open My Heart – Live Bug Bounty event with Lazada]]></title><link>https://www.yeswehack.com/en/blog/open-my-heart-live-bug-bounty-with-lazada</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/open-my-heart-live-bug-bounty-with-lazada</guid><pubDate>Mon, 26 Sep 2022 08:31:00 GMT</pubDate></item><item><title><![CDATA[Let’s get the IoT landscape less vulnerable for all]]></title><link>https://www.yeswehack.com/en/blog/lets-get-the-iot-landscape-less-vulnerable-for-all</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/lets-get-the-iot-landscape-less-vulnerable-for-all</guid><pubDate>Thu, 22 Sep 2022 09:18:00 GMT</pubDate></item><item><title><![CDATA[Back to Decathlon’s Live Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/back-to-decathlons-live-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/back-to-decathlons-live-bug-bounty</guid><pubDate>Wed, 15 Jun 2022 09:24:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #17 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-17-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-17-winners</guid><pubDate>Mon, 13 Jun 2022 14:44:00 GMT</pubDate></item><item><title><![CDATA[The French government’s digital identity application under Bug Bounty program on YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/the-french-governments-digital-identity-application-under-bug-bounty-program-on-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/the-french-governments-digital-identity-application-under-bug-bounty-program-on-yeswehack</guid><pubDate>Mon, 13 Jun 2022 10:14:00 GMT</pubDate></item><item><title><![CDATA[YesWeHackVR, an immersive hacking game]]></title><link>https://www.yeswehack.com/en/blog/yeswehackvr-vr-immersive-hacking-game</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehackvr-vr-immersive-hacking-game</guid><pubDate>Tue, 24 May 2022 10:28:00 GMT</pubDate></item><item><title><![CDATA[Abusing S3 Bucket Permissions]]></title><link>https://www.yeswehack.com/en/blog/abusing-s3-bucket-permissions</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/abusing-s3-bucket-permissions</guid><pubDate>Wed, 18 May 2022 13:56:00 GMT</pubDate></item><item><title><![CDATA[Parameter Discovery: A quick guide to start]]></title><link>https://www.yeswehack.com/en/blog/parameter-discovery-quick-guide-to-start</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/parameter-discovery-quick-guide-to-start</guid><pubDate>Wed, 20 Apr 2022 14:25:00 GMT</pubDate></item><item><title><![CDATA[The first live Bug Bounty for European scale-ups and unicorns]]></title><link>https://www.yeswehack.com/en/blog/the-first-live-bug-bounty-for-european-scale-ups-and-unicorns</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/the-first-live-bug-bounty-for-european-scale-ups-and-unicorns</guid><pubDate>Wed, 06 Apr 2022 10:32:00 GMT</pubDate></item><item><title><![CDATA[Getting started with smart contract in Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/getting-started-smart-contract-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/getting-started-smart-contract-bug-bounty</guid><pubDate>Tue, 05 Apr 2022 14:12:00 GMT</pubDate></item><item><title><![CDATA[Getting Started with iOS Penetration Testing (Part 2)]]></title><link>https://www.yeswehack.com/en/blog/getting-started-ios-penetration-testing-part-2</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/getting-started-ios-penetration-testing-part-2</guid><pubDate>Fri, 18 Mar 2022 15:30:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #15 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-15-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-15-winners</guid><pubDate>Mon, 28 Feb 2022 15:55:00 GMT</pubDate></item><item><title><![CDATA[Subdomains Tools Review: a full and detailed comparison of subdomain enumeration tools]]></title><link>https://www.yeswehack.com/en/blog/subdomains-tools-review-full-detailed-comparison</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/subdomains-tools-review-full-detailed-comparison</guid><pubDate>Fri, 18 Feb 2022 15:47:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #19 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-19-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-19-winners</guid><pubDate>Sat, 12 Feb 2022 14:54:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #18 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojoweb-application-bypass-v2-0</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojoweb-application-bypass-v2-0</guid><pubDate>Fri, 11 Feb 2022 15:04:00 GMT</pubDate></item><item><title><![CDATA[Demand for crowdsourced security booms: YesWeHack bug bounty platform continues to thrive]]></title><link>https://www.yeswehack.com/en/blog/demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive</guid><pubDate>Mon, 31 Jan 2022 10:41:00 GMT</pubDate></item><item><title><![CDATA[Getting Started with iOS Penetration Testing (Part 1)]]></title><link>https://www.yeswehack.com/en/blog/getting-started-ios-penetration-testing-part-1</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/getting-started-ios-penetration-testing-part-1</guid><pubDate>Wed, 19 Jan 2022 15:37:00 GMT</pubDate></item><item><title><![CDATA[Log4Shell, Ten Days On: YesWeHack’s Hunters Are at the Forefront of Securing Organisations]]></title><link>https://www.yeswehack.com/en/blog/log4shell-yeswehacks-hunters-forefront-securing-organisations</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/log4shell-yeswehacks-hunters-forefront-securing-organisations</guid><pubDate>Mon, 20 Dec 2021 10:44:00 GMT</pubDate></item><item><title><![CDATA[ATG uses ethical hackers to rein in cybersecurity challenges]]></title><link>https://www.yeswehack.com/en/blog/atg-ethical-hackers-cybersecurity-challenges-partnership-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/atg-ethical-hackers-cybersecurity-challenges-partnership-yeswehack</guid><pubDate>Wed, 01 Dec 2021 12:57:00 GMT</pubDate></item><item><title><![CDATA[3 Ways Customisable Bug Bounty Programs Improve Flexibility and Agility]]></title><link>https://www.yeswehack.com/en/blog/three-ways-customisable-bug-bounty-programs-improve-flexibility-and-agility</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/three-ways-customisable-bug-bounty-programs-improve-flexibility-and-agility</guid><pubDate>Tue, 30 Nov 2021 13:10:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #14 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-14-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-14-winners</guid><pubDate>Mon, 25 Oct 2021 15:06:00 GMT</pubDate></item><item><title><![CDATA[DANA invites thousands of global security experts to test its e-wallet]]></title><link>https://www.yeswehack.com/en/blog/dana-invites-thousands-of-global-security-experts-to-test-its-e-wallet-in-partnership-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dana-invites-thousands-of-global-security-experts-to-test-its-e-wallet-in-partnership-with-yeswehack</guid><pubDate>Thu, 21 Oct 2021 12:15:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #6 : Generate your reports directly in Burp Suite with RIO]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-6-generate-reports-directly-burp-suite</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-6-generate-reports-directly-burp-suite</guid><pubDate>Thu, 14 Oct 2021 12:19:00 GMT</pubDate></item><item><title><![CDATA[ZTE Corporation expands its Bug Bounty in partnership with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/zte-corporation-expands-its-bug-bounty-in-partnership-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/zte-corporation-expands-its-bug-bounty-in-partnership-with-yeswehack</guid><pubDate>Mon, 11 Oct 2021 12:19:00 GMT</pubDate></item><item><title><![CDATA[3 Ways to Increase Profits by Driving Agility with Bug Bounty Programs]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-increase-profits-by-driving-agility</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-increase-profits-by-driving-agility</guid><pubDate>Mon, 04 Oct 2021 12:21:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #13 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-13-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-13-winners</guid><pubDate>Fri, 24 Sep 2021 15:08:00 GMT</pubDate></item><item><title><![CDATA[PwnMachine: quick update about fix and new features]]></title><link>https://www.yeswehack.com/en/blog/pwnmachine-quick-update</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pwnmachine-quick-update</guid><pubDate>Wed, 22 Sep 2021 12:58:00 GMT</pubDate></item><item><title><![CDATA[3 Ways to Reduce Overhead Costs and Resources with Bug Bounty Programs]]></title><link>https://www.yeswehack.com/en/blog/reduce-overhead-costs-and-resources-with-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/reduce-overhead-costs-and-resources-with-bug-bounty</guid><pubDate>Mon, 20 Sep 2021 12:27:00 GMT</pubDate></item><item><title><![CDATA[Tips for writing your best Bug Bounty report]]></title><link>https://www.yeswehack.com/en/blog/tips-write-report-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/tips-write-report-bug-bounty</guid><pubDate>Thu, 16 Sep 2021 14:51:00 GMT</pubDate></item><item><title><![CDATA[3 Ways to Stretch Your Security Budget Further With Bug Bounty Programs]]></title><link>https://www.yeswehack.com/en/blog/3-ways-to-stretch-your-security-budget-further-with-bug-bounty-programs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/3-ways-to-stretch-your-security-budget-further-with-bug-bounty-programs</guid><pubDate>Mon, 13 Sep 2021 12:31:00 GMT</pubDate></item><item><title><![CDATA[Crowdsourced Security by YesWeHack Helps Swiss Post to Secure Switzerland’s Digital Trust With Rewards up to 230K Euros]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-helps-swiss-post-to-secure-switzerlands-digital-trust-with-rewards</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-helps-swiss-post-to-secure-switzerlands-digital-trust-with-rewards</guid><pubDate>Tue, 07 Sep 2021 12:36:00 GMT</pubDate></item><item><title><![CDATA[Introduction to postMessage() Vulnerabilities]]></title><link>https://www.yeswehack.com/en/blog/introduction-postmessage-vulnerabilities</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/introduction-postmessage-vulnerabilities</guid><pubDate>Wed, 25 Aug 2021 14:52:00 GMT</pubDate></item><item><title><![CDATA[Give Your Business The Much Needed Security Reality Check With Bug Bounty Programs]]></title><link>https://www.yeswehack.com/en/blog/get-a-security-reality-check-with-public-bug-bounty-programs</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/get-a-security-reality-check-with-public-bug-bounty-programs</guid><pubDate>Tue, 10 Aug 2021 12:42:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #12 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-12-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-12-winners</guid><pubDate>Fri, 30 Jul 2021 15:20:00 GMT</pubDate></item><item><title><![CDATA[Pentesting Electron Applications]]></title><link>https://www.yeswehack.com/en/blog/pentesting-electron-applications</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pentesting-electron-applications</guid><pubDate>Wed, 28 Jul 2021 15:00:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack raises €16 million to accelerate its international expansion]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-raises-e16-million-to-accelerate-its-international-expansion</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-raises-e16-million-to-accelerate-its-international-expansion</guid><pubDate>Thu, 22 Jul 2021 13:18:00 GMT</pubDate></item><item><title><![CDATA[Benefits of Bug Bounty Programs to Build Transparency and Improve Accountability]]></title><link>https://www.yeswehack.com/en/blog/benefits-bug-bounty-build-transparency-and-improve-accountability</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/benefits-bug-bounty-build-transparency-and-improve-accountability</guid><pubDate>Wed, 21 Jul 2021 13:20:00 GMT</pubDate></item><item><title><![CDATA[Virtual Patching of Vulnerabilities at the Pace of Business]]></title><link>https://www.yeswehack.com/en/blog/virtual-patching-of-vulnerabilities-at-the-pace-of-business</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/virtual-patching-of-vulnerabilities-at-the-pace-of-business</guid><pubDate>Thu, 01 Jul 2021 13:26:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #5 – Intruder: Use the tool to its full advantage]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-5-burp-suite-intruder-tool-full-advantage</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-5-burp-suite-intruder-tool-full-advantage</guid><pubDate>Wed, 30 Jun 2021 12:24:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #11 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-11-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-11-winners</guid><pubDate>Mon, 28 Jun 2021 15:26:00 GMT</pubDate></item><item><title><![CDATA[Bug Bounty on Android : setup your Genymotion environment for APK analysis]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-android-setup-genymotion-environment-apk-analysis</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-android-setup-genymotion-environment-apk-analysis</guid><pubDate>Wed, 23 Jun 2021 15:06:00 GMT</pubDate></item><item><title><![CDATA[Blind XSS : setup your self-hosted XSS Hunter with the PwnMachine]]></title><link>https://www.yeswehack.com/en/blog/blind-xss-setup-self-hosted-xss-hunter-pwnmachine</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/blind-xss-setup-self-hosted-xss-hunter-pwnmachine</guid><pubDate>Fri, 18 Jun 2021 15:13:00 GMT</pubDate></item><item><title><![CDATA[File Upload Attacks (Part 2)]]></title><link>https://www.yeswehack.com/en/blog/file-upload-attacks-part-2</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/file-upload-attacks-part-2</guid><pubDate>Wed, 16 Jun 2021 15:18:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON ZAX]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-zax</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-zax</guid><pubDate>Mon, 14 Jun 2021 13:03:00 GMT</pubDate></item><item><title><![CDATA[Southeast Asia eCommerce platform Lazada launches public Bug Bounty program with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/ecommerce-platform-lazada-launches-public-bug-bounty-program-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ecommerce-platform-lazada-launches-public-bug-bounty-program-with-yeswehack</guid><pubDate>Thu, 10 Jun 2021 13:30:00 GMT</pubDate></item><item><title><![CDATA[PwnMachineV2: a new version of the self hosted pwning environment for Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/pwnmachine-new-version-pwn-environment</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pwnmachine-new-version-pwn-environment</guid><pubDate>Wed, 09 Jun 2021 13:07:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #10 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-10-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-10-winners</guid><pubDate>Tue, 25 May 2021 15:32:00 GMT</pubDate></item><item><title><![CDATA[How a world-renowned luxury brand implemented a crowdsourced security strategy]]></title><link>https://www.yeswehack.com/en/blog/how-a-world-renowned-luxury-brand-implemented-a-crowdsourced-security-strategy</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-a-world-renowned-luxury-brand-implemented-a-crowdsourced-security-strategy</guid><pubDate>Fri, 21 May 2021 13:37:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #4: Burp Suite extensions that should get your attention!]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-4-burp-suite-extensions-should-get-your-attention</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-4-burp-suite-extensions-should-get-your-attention</guid><pubDate>Wed, 19 May 2021 12:29:00 GMT</pubDate></item><item><title><![CDATA[File Upload Attacks (Part 1)]]></title><link>https://www.yeswehack.com/en/blog/file-upload-attacks-part-1</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/file-upload-attacks-part-1</guid><pubDate>Wed, 12 May 2021 15:22:00 GMT</pubDate></item><item><title><![CDATA[YesWeBurp 2.0 : A new version of our Burp Suite extension is available]]></title><link>https://www.yeswehack.com/en/blog/yesweburp-new-version-burp-suite-extension-available</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yesweburp-new-version-burp-suite-extension-available</guid><pubDate>Mon, 10 May 2021 13:12:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON S5S]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-s5s</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-s5s</guid><pubDate>Tue, 04 May 2021 13:15:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack has received the “Cybersecurity Made in Europe” label issued by ECSO]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-has-received-the-cybersecurity-made-in-europe-label</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-has-received-the-cybersecurity-made-in-europe-label</guid><pubDate>Wed, 28 Apr 2021 13:43:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #9 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-9-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-9-winners</guid><pubDate>Mon, 26 Apr 2021 15:38:00 GMT</pubDate></item><item><title><![CDATA[How-To: Learn how to write a Burp Suite extension in Kotlin – Setting up]]></title><link>https://www.yeswehack.com/en/blog/how-to-learn-write-burp-suite-extension-kotlin-setting-up</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-to-learn-write-burp-suite-extension-kotlin-setting-up</guid><pubDate>Wed, 21 Apr 2021 13:17:00 GMT</pubDate></item><item><title><![CDATA[Swiss Post launches public Bug Bounty program with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/swiss-post-launches-public-bug-bounty-program-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/swiss-post-launches-public-bug-bounty-program-with-yeswehack</guid><pubDate>Thu, 15 Apr 2021 13:45:00 GMT</pubDate></item><item><title><![CDATA[Parrot launches its Bug Bounty in partnership with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/parrot-launches-its-bug-bounty-in-partnership-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/parrot-launches-its-bug-bounty-in-partnership-with-yeswehack</guid><pubDate>Tue, 06 Apr 2021 14:03:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #8 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-8-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-8-winners</guid><pubDate>Mon, 29 Mar 2021 09:01:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack Tracker 2.1 – it’s all about communication and collaboration]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-tracker-2-1-communication-and-collaboration</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-tracker-2-1-communication-and-collaboration</guid><pubDate>Thu, 25 Mar 2021 15:06:00 GMT</pubDate></item><item><title><![CDATA[Achieve Agile Transformation with a Bug Bounty Platform]]></title><link>https://www.yeswehack.com/en/blog/achieve-agile-transformation-with-a-bug-bounty-platform</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/achieve-agile-transformation-with-a-bug-bounty-platform</guid><pubDate>Thu, 18 Mar 2021 15:08:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #7 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-7-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-7-winners</guid><pubDate>Fri, 12 Mar 2021 10:44:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #3 – AutoRepeater: add automation to your beautiful hunter life]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-autorepeater-add-automation-burp-suite</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-autorepeater-add-automation-burp-suite</guid><pubDate>Wed, 10 Mar 2021 13:35:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #2 – Auth Analyzer : How to test horizontal and vertical privileges escalation]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-auth-analyzer-test-horizontal-vertical-privileges-escalation</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-auth-analyzer-test-horizontal-vertical-privileges-escalation</guid><pubDate>Wed, 17 Feb 2021 13:38:00 GMT</pubDate></item><item><title><![CDATA[Sound policy for a vulnerable-by-default cyberspace]]></title><link>https://www.yeswehack.com/en/blog/sound-policy-for-a-vulnerable-by-default-cyberspace</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/sound-policy-for-a-vulnerable-by-default-cyberspace</guid><pubDate>Thu, 11 Feb 2021 15:12:00 GMT</pubDate></item><item><title><![CDATA[Ship Innovative Software Faster with YesWeHack Tracker 2.0]]></title><link>https://www.yeswehack.com/en/blog/ship-innovative-software-faster-with-yeswehack-tracker-2-0</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/ship-innovative-software-faster-with-yeswehack-tracker-2-0</guid><pubDate>Tue, 09 Feb 2021 15:38:00 GMT</pubDate></item><item><title><![CDATA[PimpMyBurp #1 – PwnFox + Autorize: The perfect combo to find IDOR]]></title><link>https://www.yeswehack.com/en/blog/pimpmyburp-pwnfox-autorize-find-idor</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/pimpmyburp-pwnfox-autorize-find-idor</guid><pubDate>Wed, 03 Feb 2021 13:42:00 GMT</pubDate></item><item><title><![CDATA[Resilience through community: Looking forward to 2021]]></title><link>https://www.yeswehack.com/en/blog/resilience-through-community-in-2021</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/resilience-through-community-in-2021</guid><pubDate>Thu, 28 Jan 2021 15:41:00 GMT</pubDate></item><item><title><![CDATA[How cybersecurity players gain customer trust with Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/how-cybersecurity-players-gain-customer-with-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-cybersecurity-players-gain-customer-with-bug-bounty</guid><pubDate>Tue, 26 Jan 2021 15:45:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #6 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-6-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-6-winners</guid><pubDate>Tue, 22 Dec 2020 11:11:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #3 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-3-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-3-winners</guid><pubDate>Wed, 25 Nov 2020 13:22:00 GMT</pubDate></item><item><title><![CDATA[Vulnerability Disclosure Policy through the eyes of a bug hunter]]></title><link>https://www.yeswehack.com/en/blog/vulnerability-disclosure-policy-through-the-eyes-of-a-bug-hunter</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerability-disclosure-policy-through-the-eyes-of-a-bug-hunter</guid><pubDate>Mon, 23 Nov 2020 15:53:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #2 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-2-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-2-winners</guid><pubDate>Tue, 17 Nov 2020 13:30:00 GMT</pubDate></item><item><title><![CDATA[Practical vulnerability disclosure: VDP made easy]]></title><link>https://www.yeswehack.com/en/blog/practical-vulnerability-disclosure-vdp-made-easy</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/practical-vulnerability-disclosure-vdp-made-easy</guid><pubDate>Thu, 15 Oct 2020 15:35:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack joins Tech4Trust, Switzerland’s cybersecurity accelerator]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-selected-to-join-the-tech4trust-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-selected-to-join-the-tech4trust-program</guid><pubDate>Fri, 09 Oct 2020 15:38:00 GMT</pubDate></item><item><title><![CDATA[Bug Bounty: the business enabler of any DevSecOps toolchain]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-the-business-enabler-of-any-devsecops-toolchain</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-the-business-enabler-of-any-devsecops-toolchain</guid><pubDate>Thu, 17 Sep 2020 15:39:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #5 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-5-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-5-winners</guid><pubDate>Sat, 12 Sep 2020 12:04:00 GMT</pubDate></item><item><title><![CDATA[Cybersecurity spending: fulfil priorities with leaner resources]]></title><link>https://www.yeswehack.com/en/blog/cybersecurity-spending-fulfil-priorities-with-leaner-resources</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/cybersecurity-spending-fulfil-priorities-with-leaner-resources</guid><pubDate>Thu, 03 Sep 2020 15:49:00 GMT</pubDate></item><item><title><![CDATA[How we help our clients step-by-step in their Bug Bounty journey]]></title><link>https://www.yeswehack.com/en/blog/how-we-help-our-clients-step-by-step-in-their-bug-bounty-journey</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-we-help-our-clients-step-by-step-in-their-bug-bounty-journey</guid><pubDate>Wed, 26 Aug 2020 15:53:00 GMT</pubDate></item><item><title><![CDATA[Learn ethical hacking: Insights from YesWeHackEDU users]]></title><link>https://www.yeswehack.com/en/blog/learn-ethical-hacking-insights-from-yeswehackedu-users</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/learn-ethical-hacking-insights-from-yeswehackedu-users</guid><pubDate>Thu, 20 Aug 2020 15:59:00 GMT</pubDate></item><item><title><![CDATA[Coordinated Vulnerability Disclosure policy for a safer cyberspace]]></title><link>https://www.yeswehack.com/en/blog/coordinated-vulnerability-disclosure-policy-for-a-safer-cyberspace</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/coordinated-vulnerability-disclosure-policy-for-a-safer-cyberspace</guid><pubDate>Thu, 06 Aug 2020 16:09:00 GMT</pubDate></item><item><title><![CDATA[DevSecOps: Integrating security from idea to continuous delivery]]></title><link>https://www.yeswehack.com/en/blog/devsecops-integrating-security-from-idea-to-continuous-delivery</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/devsecops-integrating-security-from-idea-to-continuous-delivery</guid><pubDate>Thu, 30 Jul 2020 16:13:00 GMT</pubDate></item><item><title><![CDATA[Boosting E-Commerce Security: PrestaShop's Success with YesWeHack's Public Bug Bounty Program]]></title><link>https://www.yeswehack.com/en/blog/prestashop-europes-leading-ecommerce-software-moves-to-public-bug-bounty-programme</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/prestashop-europes-leading-ecommerce-software-moves-to-public-bug-bounty-programme</guid><pubDate>Thu, 23 Jul 2020 01:42:00 GMT</pubDate></item><item><title><![CDATA[Presenting The Pwning-Machine, a versatile and easy to setup Bug bounty environment.]]></title><link>https://www.yeswehack.com/en/blog/the-pwning-machine</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/the-pwning-machine</guid><pubDate>Thu, 16 Jul 2020 01:46:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON SONNY]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-sonny</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-sonny</guid><pubDate>Thu, 02 Jul 2020 13:39:00 GMT</pubDate></item><item><title><![CDATA[A framework for successful vulnerability disclosure policy]]></title><link>https://www.yeswehack.com/en/blog/a-framework-for-successful-vulnerability-disclosure-policy</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/a-framework-for-successful-vulnerability-disclosure-policy</guid><pubDate>Thu, 11 Jun 2020 01:48:00 GMT</pubDate></item><item><title><![CDATA[How cloud providers use bug bounty to increase customer trust]]></title><link>https://www.yeswehack.com/en/blog/how-cloud-providers-use-bug-bounty-to-increase-customers-trust</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-cloud-providers-use-bug-bounty-to-increase-customers-trust</guid><pubDate>Thu, 04 Jun 2020 01:52:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack ensures the continuous security of France’s COVID-19 contact tracing app]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-ensures-the-continuous-security-of-frances-covid-19-contact-tracing-app</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-ensures-the-continuous-security-of-frances-covid-19-contact-tracing-app</guid><pubDate>Tue, 26 May 2020 02:00:00 GMT</pubDate></item><item><title><![CDATA[Mobilising collective intelligence for better security]]></title><link>https://www.yeswehack.com/en/blog/vulnerability-coordination-mobilising-collective-intelligence-for-better-security</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/vulnerability-coordination-mobilising-collective-intelligence-for-better-security</guid><pubDate>Thu, 14 May 2020 02:04:00 GMT</pubDate></item><item><title><![CDATA[FireBounty x ONYPHE: Surfacing disclosure policies gets a boost]]></title><link>https://www.yeswehack.com/en/blog/firebounty-x-onyphe-surfacing-disclosure-policies-gets-a-boost</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/firebounty-x-onyphe-surfacing-disclosure-policies-gets-a-boost</guid><pubDate>Thu, 07 May 2020 02:08:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON HISXO]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-hisxo</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-hisxo</guid><pubDate>Thu, 30 Apr 2020 13:40:00 GMT</pubDate></item><item><title><![CDATA[Olvid, the ultra-secure messaging app, moves to public bug bounty program]]></title><link>https://www.yeswehack.com/en/blog/olvid-the-ultra-secure-messaging-app-moves-to-public-bug-bounty-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/olvid-the-ultra-secure-messaging-app-moves-to-public-bug-bounty-program</guid><pubDate>Tue, 28 Apr 2020 06:02:00 GMT</pubDate></item><item><title><![CDATA[Roles and responsibilities for efficient vulnerability disclosure]]></title><link>https://www.yeswehack.com/en/blog/roles-and-responsibilities-for-efficient-vulnerability-disclosure</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/roles-and-responsibilities-for-efficient-vulnerability-disclosure</guid><pubDate>Thu, 16 Apr 2020 06:07:00 GMT</pubDate></item><item><title><![CDATA[ZeroDisclo.com: Vulnerability disclosure done right]]></title><link>https://www.yeswehack.com/en/blog/zerodisclo-com-vulnerability-disclosure-done-right</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/zerodisclo-com-vulnerability-disclosure-done-right</guid><pubDate>Thu, 09 Apr 2020 06:09:00 GMT</pubDate></item><item><title><![CDATA[How a heavily regulated financial institution implemented Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/how-a-heavily-regulated-financial-institution-implemented-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-a-heavily-regulated-financial-institution-implemented-bug-bounty</guid><pubDate>Thu, 02 Apr 2020 06:20:00 GMT</pubDate></item><item><title><![CDATA[YesWeHackEDU: Addressing talent shortage through Bug Bounty]]></title><link>https://www.yeswehack.com/en/blog/yeswehackedu-addressing-talent-shortage-through-bug-bounty</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehackedu-addressing-talent-shortage-through-bug-bounty</guid><pubDate>Thu, 26 Mar 2020 06:24:00 GMT</pubDate></item><item><title><![CDATA[How Outscale secures its sovereign cloud with YesWeHack]]></title><link>https://www.yeswehack.com/en/blog/how-outscale-secures-its-sovereign-cloud-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/how-outscale-secures-its-sovereign-cloud-with-yeswehack</guid><pubDate>Mon, 09 Mar 2020 06:27:00 GMT</pubDate></item><item><title><![CDATA[DOJO CHALLENGE #4 Winners!]]></title><link>https://www.yeswehack.com/en/blog/dojo-challenge-4-winners</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/dojo-challenge-4-winners</guid><pubDate>Wed, 12 Feb 2020 13:11:00 GMT</pubDate></item><item><title><![CDATA[Showcasing your vulnerability disclosure policy to the world]]></title><link>https://www.yeswehack.com/en/blog/showcasing-your-vulnerability-disclosure-policy-to-the-world</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/showcasing-your-vulnerability-disclosure-policy-to-the-world</guid><pubDate>Thu, 23 Jan 2020 06:31:00 GMT</pubDate></item><item><title><![CDATA[Deezer protects their artists & users with a public Bug Bounty program]]></title><link>https://www.yeswehack.com/en/blog/deezer-protects-their-artists-users-with-a-public-bug-bounty-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/deezer-protects-their-artists-users-with-a-public-bug-bounty-program</guid><pubDate>Mon, 20 Jan 2020 06:40:00 GMT</pubDate></item><item><title><![CDATA[BlaBlaCar leverages crowdsourced security to secure its millions of users’ data]]></title><link>https://www.yeswehack.com/en/blog/blablacar-leverages-crowdsourced-security-to-secure-its-millions-of-users-data</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/blablacar-leverages-crowdsourced-security-to-secure-its-millions-of-users-data</guid><pubDate>Mon, 13 Jan 2020 06:44:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON EBODA]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-eboda</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-eboda</guid><pubDate>Wed, 11 Dec 2019 14:41:00 GMT</pubDate></item><item><title><![CDATA[Bug Bounty’s strengths compared to penetration testing]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-strengths-compared-to-penetration-testing</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-strengths-compared-to-penetration-testing</guid><pubDate>Mon, 25 Nov 2019 06:48:00 GMT</pubDate></item><item><title><![CDATA[Fighting malware at the roots]]></title><link>https://www.yeswehack.com/en/blog/fighting-malware-at-the-roots</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/fighting-malware-at-the-roots</guid><pubDate>Tue, 12 Nov 2019 06:51:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack EDU, the world’s first Bug Bounty educational platform]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-edu-the-worlds-first-bug-bounty-educational-platform</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-edu-the-worlds-first-bug-bounty-educational-platform</guid><pubDate>Wed, 06 Nov 2019 06:57:00 GMT</pubDate></item><item><title><![CDATA[Bug bounty is significantly more cost-effective than penetration testing]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-is-much-more-cost-effective-than-penetration-testing</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-is-much-more-cost-effective-than-penetration-testing</guid><pubDate>Tue, 05 Nov 2019 07:02:00 GMT</pubDate></item><item><title><![CDATA[Bug bounty agility is key for small organisations]]></title><link>https://www.yeswehack.com/en/blog/bug-bounty-agility-is-key-for-small-organisations</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/bug-bounty-agility-is-key-for-small-organisations</guid><pubDate>Mon, 21 Oct 2019 07:08:00 GMT</pubDate></item><item><title><![CDATA[We have a small message for the hackers playing with us.]]></title><link>https://www.yeswehack.com/en/blog/we-have-a-small-message-for-our-hunters</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/we-have-a-small-message-for-our-hunters</guid><pubDate>Thu, 17 Oct 2019 14:02:00 GMT</pubDate></item><item><title><![CDATA[gitGraber: A tool to monitor GitHub in real-time to find sensitive data]]></title><link>https://www.yeswehack.com/en/blog/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data</guid><pubDate>Tue, 08 Oct 2019 07:12:00 GMT</pubDate></item><item><title><![CDATA[YESWEHACK PROPHILE ON Ak1t4]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-prophile-on-ak1t4</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-prophile-on-ak1t4</guid><pubDate>Tue, 24 Sep 2019 13:43:00 GMT</pubDate></item><item><title><![CDATA[Singapore Polytechnic partners with YesWeHack to hold its first-ever bug bounty event]]></title><link>https://www.yeswehack.com/en/blog/singapore-polytechnic-partners-with-yeswehack</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/singapore-polytechnic-partners-with-yeswehack</guid><pubDate>Fri, 06 Sep 2019 07:50:00 GMT</pubDate></item><item><title><![CDATA[A quick update on our ranking point system]]></title><link>https://www.yeswehack.com/en/blog/a-quick-update-on-our-point-system</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/a-quick-update-on-our-point-system</guid><pubDate>Wed, 24 Jul 2019 08:49:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack & Alibaba Security Meetup challenge solution]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-alibaba-hackinggame-writeup</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-alibaba-hackinggame-writeup</guid><pubDate>Tue, 25 Jun 2019 14:08:00 GMT</pubDate></item><item><title><![CDATA[Catch the flag, catch the (real!) gold]]></title><link>https://www.yeswehack.com/en/blog/catch-the-flag-catch-the-gold</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/catch-the-flag-catch-the-gold</guid><pubDate>Tue, 11 Jun 2019 08:57:00 GMT</pubDate></item><item><title><![CDATA[Let’s break stuff together Singapore: YesWeHack is coming up with a brand new CTF at Infosec in the City!]]></title><link>https://www.yeswehack.com/en/blog/lets-break-stuff-together-singapore-yeswehack-is-coming-up-with-a-brand-new-ctf-at-infosec-in-the-city</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/lets-break-stuff-together-singapore-yeswehack-is-coming-up-with-a-brand-new-ctf-at-infosec-in-the-city</guid><pubDate>Fri, 07 Jun 2019 09:30:00 GMT</pubDate></item><item><title><![CDATA[The Cybersecurity Act: Strengthening coordinated vulnerability disclosure at the European level]]></title><link>https://www.yeswehack.com/en/blog/the-cybersecurity-act-strengthening-coordinated-vulnerability-disclosure-at-the-european-level</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/the-cybersecurity-act-strengthening-coordinated-vulnerability-disclosure-at-the-european-level</guid><pubDate>Wed, 05 Jun 2019 09:33:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack – Europe’s leading Bug Bounty platform – is opening an office in Singapore]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-europes-leading-bug-bounty-platform-is-opening-an-office-in-singapore</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-europes-leading-bug-bounty-platform-is-opening-an-office-in-singapore</guid><pubDate>Mon, 27 May 2019 09:37:00 GMT</pubDate></item><item><title><![CDATA[New YesWeHack Api Extension for Burp]]></title><link>https://www.yeswehack.com/en/blog/new-burpsuite-extension</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/new-burpsuite-extension</guid><pubDate>Fri, 24 May 2019 09:46:00 GMT</pubDate></item><item><title><![CDATA[Solution for “A Weird XSS Case”]]></title><link>https://www.yeswehack.com/en/blog/solution-for-a-weird-xss-case</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/solution-for-a-weird-xss-case</guid><pubDate>Mon, 01 Apr 2019 13:47:00 GMT</pubDate></item><item><title><![CDATA[New features for quicker and improved Bug Reporting!]]></title><link>https://www.yeswehack.com/en/blog/new-features-for-quicker-and-improved-bug-reporting</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/new-features-for-quicker-and-improved-bug-reporting</guid><pubDate>Tue, 19 Mar 2019 10:24:00 GMT</pubDate></item><item><title><![CDATA[Lucas aka BitK: high level bug hunter and the brand new YesWeHack Tech Ambassador.]]></title><link>https://www.yeswehack.com/en/blog/lucas-aka-bitk-bug-hunter-and-yeswehack-tech-ambassador</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/lucas-aka-bitk-bug-hunter-and-yeswehack-tech-ambassador</guid><pubDate>Fri, 15 Mar 2019 10:33:00 GMT</pubDate></item><item><title><![CDATA[We are SPARTAns: Re-imagining cybersecurity for the European Union]]></title><link>https://www.yeswehack.com/en/blog/we-are-spartans-re-imagining-cybersecurity-for-the-european-union</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/we-are-spartans-re-imagining-cybersecurity-for-the-european-union</guid><pubDate>Thu, 28 Feb 2019 10:39:00 GMT</pubDate></item><item><title><![CDATA[[ITW] Daniel Kalinowski: “Participating in bug bounties improves your skills and increase the overall knowledge.”]]></title><link>https://www.yeswehack.com/en/blog/itw-daniel-kalinowski</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/itw-daniel-kalinowski</guid><pubDate>Mon, 18 Feb 2019 10:44:00 GMT</pubDate></item><item><title><![CDATA[YesWeHack raises €4 million and plans to disrupt Europe’s cybersecurity market]]></title><link>https://www.yeswehack.com/en/blog/yeswehack-raises-e4-million-and-plans-to-disrupt-europes-cybersecurity-market</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/yeswehack-raises-e4-million-and-plans-to-disrupt-europes-cybersecurity-market</guid><pubDate>Thu, 14 Feb 2019 13:03:00 GMT</pubDate></item><item><title><![CDATA[French Armed Forces Ministry launches a Bug Bounty program]]></title><link>https://www.yeswehack.com/en/blog/french-armed-forces-ministry-launches-a-bug-bounty-program</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/french-armed-forces-ministry-launches-a-bug-bounty-program</guid><pubDate>Fri, 25 Jan 2019 14:41:00 GMT</pubDate></item><item><title><![CDATA[Incentive Policy for Coordinated Vulnerability Disclosure]]></title><link>https://www.yeswehack.com/en/blog/incentive-policy-for-coordinated-vulnerability-disclosure</link><guid isPermaLink="true">https://www.yeswehack.com/en/blog/incentive-policy-for-coordinated-vulnerability-disclosure</guid><pubDate>Tue, 18 Apr 2017 08:05:00 GMT</pubDate></item></channel></rss>