#whiteHat

Wen Bin :verified:kongwenbin@infosec.exchange
2025-05-12

❓ How can bug bounty programs …
1️⃣ Keep hackers engaged in the long term?
2️⃣ Effectively increase the amount of good quality reports that you receive?
3️⃣ Stand out from competition and be the program that hackers choose to hack on?

📽️ In this video, I covered 5 tips that can allow any bug bounty programs to stand out from the rest. If you implement them, you can expect an increased participation from skilled and good hackers (or security researchers) and a consistent stream of valuable vulnerability submissions! Most importantly, are you ready to handle the resulting high quality reports? 😊

🫵 Hackers, if these tips hit the mark, please share them with your favourite bug bounty programs! Your input could lead to improvements like loyalty programs and direct report submissions (skip platform analysts or triage teams). Let's level up the bug bounty landscape together! 😎

⬇️⬇️⬇️

youtu.be/msr-7ZtmLdE

#bugbounty #bugbountytips #togetherwehitharder #hackerone #ittakesacrowd #outhackthemall #bugcrowd #bugcrowdtipjar #hackwithintigriti #intigriti #yeswehack #yeswerhackers #ethicalhacking #whitehat

Five tips for boosting long term engagement in your bug bounty program! Check out the video for more information
D_70WN 🌈 🏳️‍⚧️D_70WN@chaos.social
2025-04-24

The company was informed by me with a full report and the chance to clean things up, the copied data was deleted and the hard disk was physically destroyed completely by an appropriate service provider. 2/2

#whitehat #digitalforensic

So... Yeah...

I was today years old when I found out about residential proxies and rotating IP providers...

Crikey...I think my #whitehat looks a bit gray all of the sudden 😬

#infosec

Phillemon CEH | CTHwardenshield
2025-04-12

🎭💻 Think Like a Black Hat, Act Like a White Hat!

👁️‍🗨️ Let's Face-It ! ->To outsmart cybercriminals, you must think like one—but use your skills for defense, not destruction. Learn the mindset of hackers and the strategies ethical hackers use to strengthen cybersecurity. 🔍🔐
📖 Read more: wardenshield.com/think-like-a-

Phillemon CEH | CTHwardenshield
2025-03-18

🛡️💻 Этический хакинг: защита цифрового мира! Как специалисты по кибербезопасности используют хакинг во благо? Узнайте, как этичные хакеры помогают предотвращать атаки и укреплять защиту данных. 🔍🔐

🔗 Подробнее: wardenshield.com/harnessing-et

Phillemon CEH | CTHwardenshield
2025-03-15

🎭💻 Think Like a Black Hat, Act Like a White Hat!

🚀 NEW & On Demand! 🌟

To outsmart cybercriminals, you must think like one—but use your skills for defense, not destruction. Learn hacker mindsets & ethical hacking strategies to fortify cybersecurity! 🔍🔐

📖 Read more: wardenshield.com/think-like-a-

Phillemon CEH | CTHwardenshield
2025-03-14

🎭💻 Think Like a Black Hat, Act Like a White Hat!

👁️‍🗨️ Let's Face-It ! -> 🕵‍♂️ To Outsmart cybercriminals, you must think like one—but use your skills for defense, not destruction. Learn the mindset of hackers and the strategies ethical hackers use to strengthen cybersecurity. 🔍🔐

📖 Read more: wardenshield.com/think-like-a-

Official Kakistocracy Jester 🪓OGjester@stranger.social
2025-03-06

Mission for a #WhiteHat hacker: take over the controls of a SpaceX Falcon-9 or Falcon Heavy rocket, and land the boosters in Europe so they can reverse engineer the rockets and stop using SpaceX or Russia to launch their stuff.

Alan Rycroft 🇨🇦alanrycroft@mastodon.world
2025-03-04

It would be interesting if the #hacker #WhiteHat communities targeted #Tesla #SpaceX and all Musk-controlled entities

#DictatorTrump #BoycottMusk

Marc jr Landoltlandev
2025-03-02

should maybe include a hint (eg. in their awards-statues), that for blackhats there is usually no way back.

And as long as 's or autistic people are aware of blackhat crimes and murderers, they hunt down all whitehats like they killed Native Americans

Oder meine zerstörte Hackerspace Garage oder abgebrannte HackerSpaches...

CC: @dcfurs @defcon @linuzifer @163381 @ccc @sylvia_ritter 20241219 @ravenland @Pixtxa @chaostreffbern @piratenpartei@mastodon.partipirate.org @piratenpartei@pirati.ca @ppsde

how feasible is it write a #whitehat #smartphone #virus that listens to conversations and uses #machinelearning (not LLMs please) to pop up real time debunks of #misinformation and #disinformation it catches in nearby conversations? like just tap into the "Hey Siri" function...

developer.overheid.nldeveloper@social.overheid.nl
2025-02-22

Weekend-podcast-tip!

De nieuwste aflevering van De Technoloog met Chester van den Bogaard over ethisch hacken is zeer de moeite waard. 🎧💻

Onder andere de Advisories van onze collega's bij het NCSC kwamen langs—deze lijst met beveiligingsadviezen helpt organisaties kwetsbaarheden te dichten.

🎙️ Luister hier: open.spotify.com/episode/7gtGy

#security #whitehat #hacking #NCSC #cybersecurity

2025-02-08

In der Ferienunterkunft ist das Gästenetz nicht vom "Rest" getrennt. Ich kann mich auf den Wechselrichter der Solaranlage mit dem Default-Passwort einloggen und auf meinem Android wird mir die Steuerung des Gastgeber-TV-Gerätes in die Benachrichtigungen gelegt.
Die Gastgeber haben absolut keine Ahnung und nur begrenzt Interesse / Verständnis.

Was würdet ihr tun?

#WhiteHat #keinSchaden #NoHarm

I saw this posted on Xiaohongshu. Not all heroes wear capes. Some wear fursonas.
#hacking #whitehat #whitehathacker #cybersecurity #furry #hardening #pentesting

Kellic Tiger :verified_paw:KellicTiger@tiggi.es
2025-01-28

Oh man does this take me back. And no I'm not going to feel bad about posting data about Access Points from 22 years ago. 🤣 If someone is still running an AP from 2003....I'm not sure what to even say.
This was fun at the time especially seeing so many open AP's. Now it would be boring as people's freaking car's are running AP's.
The only one I really accessed was my neighbors. I found a printer on his network. Looked up the model AP they had, added the printer to my laptop and printed off the pages on how to change the AP's password. A day later the thing was secured. :D #WhiteHat #FTW

Merged data file from 2003 with SSID + Lat and Long details.
Prof. Dr. Dennis-Kenji Kipkerkenji@chaos.social
2025-01-24

1.000 Gründe für die dringend notwendige #Reform vom #Computerstrafrecht - und seit heute wieder einer mehr: So wurde bekannt, dass der "#Cyberangriff" auf D-Trust vor Kurzem wohl ein #Whitehat Sicherheitsforscher war, der über eine offene API auf die Daten zugegriffen hat. Aufgrund der rechtlichen Grauzone des "#Hacker-Paragraphen" und der von D-Trust erstatteten Strafanzeige habe er sich jedoch nicht an D-Trust, sondern unverzüglich an den #CCC gewandt:

heise.de/news/D-Trust-Hinter-A

քʏʀǟȶɛɮɛǟʀɖpyratebeard@harbour.cafe
2024-11-28

have been thinking of buying a flipper zero for a while. the limited edition transparent version dropped today, couldn't help myself

#flipperzero #hacking #cracking #whitehat #blackhat #hacktheplanet

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst