How did hackers take control of Ferrari's website?

Published by Gus on
Red Ferrari Enzo image
Ethical hacker and bug bounty hunter Sam Curry reported that Ferrari’s subdomain was hosting a fake NFT (Non-Fungible Token) scam. The attackers exploited a flaw in the Adobe Experience Manager on the official website of Ferrari to hijack its subdomain and host the encrypted NFT... Read More

Can I make money with bug bounty? How much?

Published by Gus on
Yes, you can make money in bug bounty programs. Bug bounty programs are initiatives offered by companies and organizations that reward individuals for finding security vulnerabilities in their software or systems. Rewards can range from a few hundred dollars to tens of thousands of dollars depend... Read More

What is a website vulnerability scanner

Published by Gus on
Website vulnerability scanner report sample
A website vulnerability scanner is an automated software designed to search for security vulnerabilities in a website. It scans for web vulnerabilities within web services, web servers, proxy servers, or web application servers. ... Read More
By using this website you agree to our Cookie Policy.

Cookie Settings

We use cookies to improve user experience. Choose what cookie categories you allow us to use. You can read more about our Cookie Policy by clicking on Cookie Policy below.

These cookies enable strictly necessary cookies for security, language support and verification of identity. These cookies can’t be disabled.

These cookies collect data to remember choices users make to improve and give a better user experience. Disabling can cause some parts of the site to not work properly.

These cookies help us to understand how visitors interact with our website, help us measure and analyze traffic to improve our service.

These cookies help us to better deliver marketing content and customized ads.