Security bug hunters focus on misconfigured services, earn big rewards

An overview of the hacking activity on the HackerOne vulnerability coordination and bug bounty platform shows that misconfiguration of cloud resources is quickly becoming a hot target for ethical hackers. […] This post appeared first on Bleeping Computer
Author: Ionut Ilascu