- Hive Five
- Posts
- 🐝 Hive Five 46 - Melliferous
🐝 Hive Five 46 - Melliferous
Photo by Christina Branco / Unsplash
Hi friends,
Greetings from the hive!
I’m thankful for all of the wonderful people I’ve met on my journey so far.
After further researching stoicism, I discovered the Latin phrase amor fati, translated as “love of fate”.
I’ll be adopting this mindset from now on, and when something unfortunate happens, I’ll embrace it and say thanks instead.
What are you thankful for?
Let's take this week by swarm!
🐝 The Bee's Knees
Monitor trending CVEs: Data comes from Twitter + NIST NVD APIs - back-end: Python, Flask, PostgreSQL, and Redis - front-end: React + Bootstrap.
$16k Stealing secrets.yaml from GitLab using stored XSS - Hackerone bug bounty: This video is an explanation of a bug bounty report submitted to GitLab bug bounty program via Hackerone by William Bowling.
Wordpress Plugin Update Confusion - The full guide how to scan and mitigate the next big Supply Chain Attack: A couple of month ago while browsing twitter on a weekend Nagli stubmled upon a rather interesting post from @vavkamil.
Finding XSS on .apple.com and building a proof of concept to leak your PII information: Back in February of this year zseano hacked with members of BugBountyHunter.com on a public bug bounty program and we chose Apple as our target.
Enzyme Finance Price Oracle Manipulation Bug Fix Postmortem: In 2020 and at the beginning of 2021, one of the worst phrases you could hear either as a DeFi security researcher or developer was, “Project X was hacked due to Price Oracle manipulation using flashloans.
🙏🏻 Enjoy This Newsletter?
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
TCM Security Academy - courses, bundles, gift certs, and access passes. Cybersecurity Training That Doesn't Break the Bank. Don't overspend on your education!
🔥 Buzzworthy
✅ Changelog
Param Miner now supports using header smuggling to identify back-end headers: Thanks to a quality contribution from @_danielthatcher.