Hackernoon logo
Hackernoon
583 reads

We discovered severe bugs in 11 startups worth $3 billion+ in a week

by
byFallible@fallible

October 6th, 2015
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
featured image - We discovered severe bugs in 11 startups worth $3 billion+ in a week
Fallible
byFallible@fallible
    byFallible@fallible

Fallible
    byFallible@fallible

Up Next →

We reverse engineered 16k apps, here’s what we found

About Author

Fallible HackerNoon profile picture
Fallible@fallible

Read my storiesAbout @fallible

Comments

avatar

TOPICS

startups#startup#cybersecurity#india

THIS ARTICLE WAS FEATURED IN

Arweave
viewblock
ViewBlock
TerminalTerminalLiteLite

Related Stories

Story image

Untitled Story

Author

HackerNoon Writer

How a startup pivot led to users data leak vulnerability
#API

How a startup pivot led to users data leak vulnerability

Fallible

Fallible

Feb 11, 2017

Windows Sticky Keys Exploit: The War Veteran That Never Dies
#HACKERS-AND-HACKING

Windows Sticky Keys Exploit: The War Veteran That Never Dies

Mark Tey

Mark Tey

Nov 20, 2019

06/02/2018: Biggest Stories in the Cryptosphere
#BITCOIN

06/02/2018: Biggest Stories in the Cryptosphere

BlockEx

BlockEx

Feb 06, 2018

0-Days are on the Rise and that Means a Lot More Work for SOC Teams
#CYBERSECURITY

0-Days are on the Rise and that Means a Lot More Work for SOC Teams

Isaac Kohen

Isaac Kohen

Jun 07, 2022

Time Bombs Inside Software: 0-Day Log4Shell is Just the Tip of The Iceberg
#LOG4J

Time Bombs Inside Software: 0-Day Log4Shell is Just the Tip of The Iceberg

Zen Chan

Zen Chan

Dec 27, 2021

/undefined feature image

/undefined feature image
author
byHackerNoon Writer
/how-pivoting-a-startup-led-to-users-data-leak-vulnerability-8c27c7ca9143 feature image

How a startup pivot led to users data leak vulnerability

/how-pivoting-a-startup-led-to-users-data-leak-vulnerability-8c27c7ca9143 feature image
author
byFallible@fallible
#API
/-windows-sticky-keys-exploit-the-war-veteran-that-never-dies-its-very-likely-that-youve-heard-8ei2duh feature image

Windows Sticky Keys Exploit: The War Veteran That Never Dies

/-windows-sticky-keys-exploit-the-war-veteran-that-never-dies-its-very-likely-that-youve-heard-8ei2duh feature image
author
byMark Tey@mark-tey
#HACKERS-AND-HACKING
/06-02-2018-biggest-stories-in-the-cryptosphere-be42171cbed4 feature image

06/02/2018: Biggest Stories in the Cryptosphere

/06-02-2018-biggest-stories-in-the-cryptosphere-be42171cbed4 feature image
author
byBlockEx@BlockEx
#BITCOIN
/0-days-are-on-the-rise-and-that-means-a-lot-more-work-for-soc-teams feature image

0-Days are on the Rise and that Means a Lot More Work for SOC Teams

/0-days-are-on-the-rise-and-that-means-a-lot-more-work-for-soc-teams feature image
author
byIsaac Kohen @isaac-kohen-teramind
#CYBERSECURITY
/0-day-log4shell-is-serious-but-its-just-the-tip-of-the-iceberg feature image

Time Bombs Inside Software: 0-Day Log4Shell is Just the Tip of The Iceberg

/0-day-log4shell-is-serious-but-its-just-the-tip-of-the-iceberg feature image
author
byZen Chan@z3nch4n
#LOG4J

Light-Mode

Classic

Newspaper

Dark-Mode

Neon Noir

Minty

HN StartUps