YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure.
Bug Bounty programs benefit from in-house triage, personalised support, a customisable model and results-based pricing. Clients include ZTE, Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces.
The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel for external vulnerability reporting); Pentest Management (managing pentest reports from all sources); Attack Surface Management (continuously mapping online exposure and detecting attack vectors); and ‘Dojo’ and YesWeHackEDU (ethical hacking training).
YesWeHack's services have ISO 27001 and ISO 27017 certifications, and its IT infrastructure is hosted by EU-based IaaS providers, compliant with the most stringent standards: ISO 27001 (+ 27017, 27018 & 27701), CSA STAR, SOC I/II Type 2 and PCI DSS.
Find out more at www.yeswehack.com
No features have been listed yet.
Based on our record, Medium seems to be a lot more popular than YesWeHack. While we know about 2264 links to Medium, we've tracked only 1 mention of YesWeHack. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
There are many resources online nowadays to learn security. You can do challenges on https://root-me.org, https://www.hackthebox.com/, https://overthewire.org/wargames/, etc. You can participate in security competitions (CTFs), see https://ctftime.org for a list of upcoming events. And finally if you are more interested in web security you can look for bugs on websites and get paid for it by https://hackerone.com... Source: over 1 year ago
Since this is effecting end users of websites directly. So instead of waiting for developer to fix it, this could help you stay protected until then https://medium.com/@wrongsahil/protecting-yourself-from-polyfill-io-malware-as-a-user-7be300ff8b94. - Source: Hacker News / 5 days ago
If you're looking for an intellectual critique of Foucault, one of the best is Jean Baudrillard's book Forget Foucault from 1977. Baudrillard both admired the depth of Foucault's historically informed philosophical analysis but questioned its objectivity especially given Foucault had little to say about how power evolved with mass media & technology - and was in a sense always fighting the last war: > "If Foucault... - Source: Hacker News / 3 days ago
Picture this: you’re scrolling through your social media feed, feeling the usual blend of amusement and boredom until suddenly, a video catches your eye. It’s not just entertaining; it’s transformative. It inspires you, educates you, or maybe just brings a smile to your face when you needed it most. You’re filled with gratitude for the creator behind this masterpiece, but a simple “like” or “share” feels... - Source: Hacker News / 2 days ago
Long story short: Facebook Ads optimizes ad delivery based on ROAS (return on ad spent) but return is sales and not profits. I open sourced the data pipeline to do just that and explained it all here: https://medium.com/@theo_dot/how-we-increased-shopify-business-profits-by-42-in-3-months-using-data-d91de3add629. - Source: Hacker News / 3 days ago
Https://arxiv.org/abs/2406.02061v1 research paper shows the reasoning breakdown in SOTA LLMs by asking a simple question, “Alice has N brothers and she also has M sisters. How many sisters does Alice’s brother have?” I investigated performance of different prompts on this question, and show that 'Expand-then solve' prompt significantly outperforms standard and chain-of-thought prompts. Article link -... - Source: Hacker News / 3 days ago
HackerOne - HackerOne provides a platform designed to streamline vulnerability coordination and bug bounty program by enlisting hackers.
Ghost - Ghost is a fully open source, adaptable platform for building and running a modern online publication. We power blogs, magazines and journalists from Zappos to Sky News.
Bugcrowd - Harness the largest pool of curated and ranked security researchers to run the most efficient bug bounty and penetration tests
WordPress - WordPress is web software you can use to create a beautiful website or blog. We like to say that WordPress is both free and priceless at the same time.
Intigriti - Intigriti offers bug bounty and agile penetration testing solutions powered by Europe's #1 leading network of ethical hackers.
Tumblr - A feature rich and free blog hosting platform offering professional and fully customizable templates, bookmarklets, photos, mobile apps, and social network integration.