Photo by Jon Tyson / Unsplash

Hi friends,

Greetings from the hive!

I hope you had a good weekend. If I seem more absent on social media lately, my personal life has been turbulent. Nothing bad, just busy.

Also, I will be at DEFCON, so hit me up if you're going too! I'd love to meet up. This also means that there'll be no edition next week.

Let's take this week by swarm!

🐝 The Bee's Knees

  1. Bugcrowd will be hosting two Bug Bash events in Vegas at Hacker Summer Camp: After months of hard work and late nights, Bugcrowd is stoked to announce it'll be hosting two Bug Bash events in Vegas at Hacker Summer Camp!

  2. LiveOverflow on how to become an expert: "In order to learn you have to be practicing at the edge of your ability, pushing beyond your comfort zone. You have to use a lot of concentration and methodically repeatedly attempt things you aren't good at." Source: The 4 things it takes to be an expert.

🙏 Support the Hive

Enjoy reading the Hive Five? Consider sponsoring the next edition.

You can also follow me on Twitter.

🔥 Buzzworthy

Changelog

  1. hakluke on making his own schedule: "I've been doing this for about 11 weeks now. [...]"

  2. SecLists 2022.3: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.

📅 Events

  1. The Diana Initiative - August 10-11, 2022: In-Person at The Westin Las Vegas Hotel & Spa.

🎉 Celebrate

💰 Career Corner

⚡️ From the Community

📰 Articles & Threads

  1. Taking leaps, not steps: "Today is a big day filled with a lot of different feelings. [...]"

  2. How To Hack Web Applications in 2022 - Part 2: TL/DR: Web applications have both authentication and authorization as key concepts and if bypassed by an attacker, it can compromise sensitive data.

  3. reconFTW, an overview: Reconnaissance, assets discovery, attack surface mapping, subdomains discovery… the initial step in a pentesting or bug hunting assessment is one of the most important and will help you find those sites that nobody found before.

📚 Resources

🎥 Videos

🎵 Audio

  1. Malicious Life - Andrew Ginter - A 40-Year-Old Backdoor ML B-Side: Ken Thompson is a legendary computer scientist who also made a seminal contribution to computer security in 1983 when he described a nifty hack that could allow an attacker to plant almost undetectable malicious code inside a C compiler. Surprisingly, it turns out a very similar hack was also used in the SolarWinds attack.

Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have **every cloud resource you need** at an affordable price.

Upgrade Now

Get access to premium content

Subscribe

Keep Reading

No posts found