Omar BenbouazzaRethinking Vulnerability Management: Why VM Deserves More AttentionIn the rapidly evolving landscape of cybersecurity, the importance of a robust Vulnerability Management (VM) lifecycle cannot be…3 min read·Mar 11, 2024----
Omar BenbouazzaNullCON GOA 2022 — Tech Bug Bounty PanelI had the great opportunity to participate as speaker at NullCON GOA 2022 last September, in the Tech Bug Bounty Panel with other Bug…1 min read·Nov 6, 2022----
Omar BenbouazzaBuilding a BugBounty Program from ScratchWhat happens when a security researcher finds a bug in your code or the way to access your customer data? Do you have a clear policy and…1 min read·May 12, 2021----
Omar BenbouazzaBuilding VDP for SuccessVulnerability Disclosure Programs (VDPs) are a clear way to tell the security researcher community how an organization wants them to report…1 min read·Apr 22, 2021----
Omar BenbouazzaSecrets on Github, a plageSoftware Engineers are humans. Humans make mistakes, and anything that can go wrong, will eventually go wrong.4 min read·Jun 22, 2020----
Omar BenbouazzaGithub Email Search ToolAt some point, maybe you had the need to contact the owner of a Github repository. That is a feasible thing but very manual, loosing a lot…1 min read·Oct 31, 2019----
Omar BenbouazzaEl cazador de cerebros — Documental TVECiberataques. La delincuencia digital1 min read·Oct 21, 2019----
Omar BenbouazzaBug Bounty Program, does it help?What happens when a security researcher finds a hole in your code? Do have a clear policy to submit this kind of findings? Most not.1 min read·Mar 6, 2019----
Omar BenbouazzaNorwegian Air, playing with VOD systemThis post is excerpted from the talk presented at the CyberSecurity Meetup Helsinki, about vulnerabilities and bad implementations in…3 min read·Sep 20, 2016----
Omar BenbouazzaKeyLemon, bypassing face-authenticationKeyLemon, is a well known application from Switzerland, that allows to enter in your session without login or password, with more than 3…3 min read·Jun 13, 2016----