SecBoard
Zurück zur Übersicht

When a Bug Bounty Isn’t Enough

IOActive·
Originalartikel lesen bei IOActive

An enterprise with a long-running public bug bounty shipped a major release. Weeks later, a critical SQL injection surfaced in an authenticated reporting path. More than ten thousand PII records and clear-text card data were reachable via crafted queries. The vulnerable code sat behind role checks...

MITRE ATT&CK Kill Chain (2 Techniken)

Lateral Movement
Command & Control
Themen
INSIGHTS