News

She has worked for 10+ years as a content strategist for small teams. White-hat hackers use their powers for good. They help out organizations that might have security breaches before the ...
It took the hackers one day to break into the smart lock used to secure people’s front doors. But breaking and entering wasn’t the goal — the hackers wanted access to the “smart hub ...
Cetus Protocol offered a bounty to the hacker in exchange for returning the funds from the Ethereum networks. All addresses ...
Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.
A white hat hacker managed to claw back $1.47M in USDC from a recent smart contract exploit that hit the Moby Trade options protocol on Arbitrum. While the ethical hackers did not mention the ...
A group of hackers won $200,000 for hacking Tesla's systems at the Pwn2Own Automotive 2024, a three-day competition in Japan hosted by Zero Day Initiative (ZDI) and VicOne. The event offers prize ...
White Hat's success stems from a unique combination of deep offensive expertise, attacker-centric research, and a team of military-grade ethical hackers. The company's proprietary 'Eye of the ...
Cash rewards await white hat hackers in an experimental bug bounty program launched on American Independence Day by the U.S. Department of Defense. The Pentagon has tinkered since 2016 with accepting ...
This August, at the famed DEFCON hacker convention, the U.S. military will stage a contest in which competing teams of white-hat hackers will, for the first time ever, try to penetrate and take ...