YesWeHack - Global Bug Bounty & Vulnerability Management Platform (original) (raw)

Logo YesWeHack

Blog

LoginContact Us

Change language

The YesWeHack Blog

Signature spoofing OpenPGP

Critical signature-spoofing vulnerability in OpenPGP.js hits the headlines

June 11, 2025

read the post

CommunityLearn Bug BountyDojoCustomer StoriesBest PracticesNews

Change published status

Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive toolsRecon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive toolsRead More ->

Signature spoofing OpenPGPCritical signature-spoofing vulnerability in OpenPGP.js hits the headlinesRead More ->

Dojo challenge #41 - Ruby treasure winners & writeupRead More ->

Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive toolsRecon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive tools

Bug Bounty recon series on information gathering with search engines – aka Google Dorking – which is illustrated with a magnifying glass zooming in on a web browser.Recon series #5: A hacker’s guide to Google dorkingRead More ->

Vulnerability prioritisationVulnerability prioritisation and validation: continuous threat exposure management (CTEM) series #2Read More ->

GitHub screenshot‘Airborne’ AirPlay attacks, netting $64k from deleted files, triaging AI slop – ethical hacker news roundupRead More ->

Bug Bounty recon series on information gathering with search engines – aka Google Dorking – which is illustrated with a magnifying glass zooming in on a web browser.Recon series #5: A hacker’s guide to Google dorking

Practical guide to path traversal and arbitrary file read attacksBeyond ‘../../’ - a practical guide to path traversal and arbitrary file read attacksRead More ->

Cutting the rising cost of DevSecOpsTackling vulnerabilities at source: How to cut the rising cost of DevSecOpsRead More ->

How the Software as a Service (SaaS) model creates single points of failureUK retail cyber-attacks a ‘wake-up call’, SaaS overreliance ‘creating single points of failure’, calls for global regulatory alignment – OffSec roundup for CISOsRead More ->

Practical guide to path traversal and arbitrary file read attacksBeyond ‘../../’ - a practical guide to path traversal and arbitrary file read attacks

1

/

30

123456...30

Next

Don't wait for threats to strike

Adopt a proactive security posture now

[@portabletext/react] Unknown block type "undefined", specify a component for it in the `components.types` prop

Book Your Discovery Call