The Power of Bug Bounty Programs in Enhancing PCI-DSS Compliance |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Oct 01, 2024 |
689 |
- |
Researcher Spotlight: Alexander Pick |
Santerra Holler |
Jun 04, 2022 |
674 |
- |
Bugcrowd Uncovers Up to 20x More Vulnerabilities for TX Group |
Lisa Bergamo |
Nov 02, 2022 |
403 |
- |
The 12 Days of Swagmas |
Erica Azad |
Dec 21, 2023 |
760 |
- |
The NIS2 Directive, Explained |
Gareth O Sullivan |
Oct 08, 2024 |
1450 |
- |
Supply Chain Backdoors, xz/liblzma, CVE-2024-3094, and what we currently know |
Michael Skelton, VP of Operations |
Mar 31, 2024 |
1741 |
- |
2024 Hacker Showdown: Carnival Of ChAIos |
Bugcrowd Researcher Success |
Oct 10, 2024 |
670 |
- |
Researcher Spotlight: Nagli |
Jordyn Jones |
Nov 11, 2022 |
1218 |
- |
Hacker Spotlight: OrwaGodfather |
Jordyn Jones |
Apr 18, 2023 |
1576 |
- |
How Bugcrowd sees Vulnerability Disclosure Programs and Points |
Andy White |
May 27, 2021 |
661 |
- |
The LevelUp CFP is open! Calling all Speakers! |
Michael Hamel |
Apr 19, 2021 |
359 |
- |
Draft Submissions & Autosave |
Andy White |
Apr 27, 2021 |
778 |
- |
Q&A with Nick McKenzie: CISO Advice, Generative AI, and Security Predictions |
Erica Azad |
Aug 15, 2023 |
806 |
- |
Meet Cooties; Pentester, CTF Enthusiast, and Full-time University Student |
Santerra Holler |
Sep 26, 2024 |
973 |
- |
Cybersecurity and Generative AI Predictions with David Fairman, CIO and CSO of Netskope |
Erica Azad |
Aug 08, 2023 |
905 |
- |
Collaboration, respect, and trust: it’s what makes the crowdsourced security world go round |
Grant McCracken |
Apr 27, 2022 |
1343 |
- |
Researcher Spotlight: Ankit Singh |
Jordyn Jones |
Jun 30, 2022 |
1252 |
- |
What it’s like working at Bugcrowd—As told by the Bugcrowd People Team |
Vangie Field |
May 21, 2024 |
1098 |
- |
Hacker Spotlight: Cinzinga |
Santerra Holler |
Sep 13, 2023 |
1085 |
- |
Career advice from women in cybersecurity for International Women’s Day |
Erica Azad |
Mar 08, 2024 |
894 |
- |
The Ultimate Guide to Finding and Escalating XSS Bugs |
Luke Stephens |
Mar 25, 2021 |
3295 |
- |
A Hacker’s Guide to Navigating Bugcrowd’s Code of Conduct |
Declan Murphy |
Apr 02, 2024 |
604 |
- |
How to Find XXE Bugs: Severe, Missed and Misunderstood |
Luke Stephens |
Feb 19, 2021 |
1304 |
- |
CrowdMatch: Auto-curated crowds for better, faster results |
Farzad Eskafi |
Oct 14, 2021 |
850 |
- |
Three Common Ways Organizations Get Hacked |
Bugcrowd |
Jun 17, 2021 |
222 |
- |
Reduce Cyber Risk with Attack Surface Discovery |
Bugcrowd |
Sep 10, 2024 |
1377 |
- |
The next step in security program management |
Paddy Cassidy |
Apr 04, 2024 |
875 |
- |
ExpressVPN Uses Crowdsourced Security to Continuously Improve its Security Posture |
Bugcrowd Customer Marketing |
Oct 10, 2023 |
427 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #1 |
Bugcrowd Researcher Success |
Jun 02, 2021 |
619 |
- |
Security Flash – Cyberattacks on MGM and Caesars |
Santerra Holler |
Oct 12, 2023 |
790 |
- |
A guide to Bluetooth Low Energy hacking |
Bugcrowd |
Sep 12, 2024 |
3430 |
- |
Hacker Spotlight: Dipen |
Santerra Holler |
Aug 17, 2023 |
840 |
- |
Announcing our P1 Warriors for Q1! |
Bugcrowd Researcher Success |
Jul 02, 2021 |
305 |
- |
Max Pen Tests: Combining the power of pen testing and bug bounty engagements |
Erica Azad |
Mar 06, 2024 |
536 |
- |
Expert Advice You Don’t Want to Miss |
Santerra Holler |
Jan 04, 2022 |
1437 |
- |
Standard Pen Tests Are Now Just A Few Clicks Away |
Kaushik Srinivas |
Apr 19, 2023 |
541 |
- |
Bugcrowd Platform Behavior Standards |
Santerra Holler |
Jun 04, 2024 |
1026 |
- |
Excellerate your Hunting with Bugcrowd and Microsoft! — The Sequel |
Michael Hamel |
Dec 01, 2021 |
491 |
- |
The Human Attack Surface: A Serious Threat to Cybersecurity |
Bugcrowd |
Sep 12, 2024 |
1344 |
- |
Announcing Multi-tier Program Management on the Bugcrowd Platform |
Paddy Cassidy |
Oct 24, 2022 |
751 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #3 |
Bugcrowd Researcher Success |
Jun 15, 2021 |
586 |
- |
Shodan: The Search Engine For Hackers |
Guest Contributor |
Sep 18, 2024 |
1411 |
- |
Get to know the Bugcrowd Security Knowledge Graph |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 27, 2024 |
485 |
- |
Top 8 CISO Priorities in 2024 |
Erica Azad |
Jul 10, 2024 |
813 |
- |
WiFi hacking tools and how to use them |
Bugcrowd |
Jul 24, 2024 |
1934 |
- |
Researcher Spotlight: Paolo Arnolfo (sw33tLie) |
Jordyn Jones |
Aug 01, 2022 |
1212 |
- |
Learnings from Bugcrowd’s Customer Advisory Board |
Paul Ciesielski |
May 29, 2024 |
526 |
- |
What is Penetration Testing? |
Samuel Tyler |
Nov 16, 2023 |
2145 |
- |
Hackers Look Ahead To 2023 |
Santerra Holler |
Jan 18, 2023 |
896 |
- |
Expiring Invites – Program Invites Update |
Bugcrowd Researcher Success |
May 13, 2021 |
528 |
- |
What is a Bugcrowd Joinable Program? |
Santerra Holler |
May 11, 2022 |
376 |
- |
Hackers Wanted for Aleo’s Inaugural Bug Bounty Program! |
Santerra Holler |
Jul 20, 2023 |
478 |
- |
Living with and Learning from Log4Shell |
Nick McKenzie |
Dec 16, 2021 |
655 |
- |
What is a Bug Bounty Program? |
Bugcrowd |
Feb 20, 2024 |
1849 |
- |
Metrics for Growing and Improving Your Bug Bounty Program |
Grant McCracken, VP of Operations |
Oct 20, 2022 |
889 |
- |
Benefits of Penetration Testing |
Bugcrowd Product Marketing |
Feb 05, 2021 |
2009 |
- |
Ingenuity Unleashed with Bugcrowd at Black Hat USA 2023 |
Erica Azad |
Aug 01, 2023 |
494 |
- |
Bugcrowd Earns CSA STAR L1 Certification |
Rakesh Unnikrishnan |
Jun 30, 2023 |
390 |
- |
VRT v1.10 Released: Flash downgrades and extended automotive categorization |
Barnett Klane |
Mar 30, 2021 |
363 |
1 |
Avoiding “Blindside” Cloud Security Attacks |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Dec 21, 2021 |
882 |
- |
7 Rules for Top-notch Web3 Bug Bounty Programs |
Security Solutions Architecture Team |
Sep 21, 2022 |
1028 |
- |
Announcing Our Latest Vulnerability Rating Taxonomy Update |
James McLean |
Nov 27, 2023 |
1075 |
- |
VRT update: Doubling down on hardware vulnerabilities |
Michael Skelton, VP of Operations |
Apr 09, 2024 |
1417 |
- |
Introducing VDP Compliance—A Free Offering From Bugcrowd |
Michael Skelton, VP of Operations |
May 02, 2024 |
610 |
- |
New UK Legislation Must Protect Good-Faith Hackers |
Dave Gerry |
Oct 23, 2023 |
551 |
- |
Why You Can Trust The Crowd |
Grant McCracken |
May 25, 2021 |
2452 |
- |
Infographic: What are Vulnerabilities? |
Bugcrowd Product Marketing |
May 20, 2021 |
116 |
- |
Inside the Platform: Bugcrowd’s Vulnerability Trends Report |
Erica Azad |
Jan 24, 2024 |
456 |
- |
Announcing our MVPs for Q1! |
Michael Hamel |
Jun 04, 2021 |
477 |
- |
5 Reasons why Customers Choose the Bugcrowd Platform |
Murtaza Hafizji |
Apr 18, 2024 |
1014 |
- |
Security Flash: CISA Order to Disconnect Ivanti Products |
Erica Azad |
Feb 01, 2024 |
293 |
- |
Racing against time: An introduction to race conditions |
Santerra Holler |
Aug 21, 2024 |
1568 |
- |
Are Cybersecurity Investments Recession-proof? |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Dec 06, 2022 |
476 |
- |
The Three Principles of Bug Bounty Duplicates |
Grant McCracken, VP of Operations |
Jun 29, 2023 |
1759 |
- |
Bugcrowd Announces the Availability of Self-Service Vulnerability Disclosure Programs |
Randy Young |
Jun 22, 2021 |
948 |
- |
What is Bugcrowd’s Hacker Advisory Board? |
Emma Navajas |
Aug 29, 2024 |
1120 |
- |
A Comprehensive Approach to People Resource Management |
Paddy Cassidy |
Oct 02, 2024 |
724 |
- |
Score big in Meme Madness |
Jordyn Jones |
Mar 20, 2024 |
455 |
- |
Customer Spotlight: Martin Choluj, VP of Security at ClickHouse |
Bugcrowd Customer Marketing |
Dec 14, 2023 |
471 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #8 |
Bugcrowd Researcher Success |
Jul 13, 2021 |
452 |
- |
Hack Your Career! Introducing the Bugcrowd Scholar Program |
Michael Hamel |
Feb 02, 2021 |
312 |
- |
2020 Bugcrowd Product Highlights |
Bugcrowd |
Jan 26, 2021 |
1054 |
- |
Why Isn’t My Program Getting Submissions? Pt. Two |
Grant McCracken |
May 04, 2021 |
4751 |
- |
Attack Surface Management vs Vulnerability Management |
Bugcrowd |
Aug 13, 2024 |
1994 |
- |
Spotlight: Ross McKerchar, CISO at Sophos |
Erica Azad |
Jul 02, 2024 |
743 |
- |
6 Hot Takes from Black Hat 2023 & DEF CON 31 |
Erica Azad |
Aug 23, 2023 |
996 |
- |
Announcing our P1 Warriors for 2022 |
Jordyn Jones |
Mar 21, 2023 |
235 |
- |
Why You Need to Invest in Your Program Health to See the Highest Return |
Bugcrowd Researcher Success |
Aug 25, 2022 |
1980 |
- |
Introducing: Bugcrowd Tip Jar |
Luke Stephens |
Mar 11, 2021 |
364 |
- |
Researcher Spotlight: Erik de Jong |
Jordyn Jones |
Feb 07, 2023 |
2045 |
- |
Announcing our P1 Warriors for Q4 2020! |
Michael Hamel |
Mar 02, 2021 |
298 |
- |
The Digital Operational Resilience Act (DORA), Explained |
Gareth O Sullivan |
Sep 05, 2024 |
1431 |
- |
Pen Testing as a Service now available in Singapore |
Samantha Andersson |
Apr 12, 2024 |
530 |
- |
Advice for pursuing a cybersecurity career |
Jordyn Jones |
Mar 28, 2024 |
896 |
- |
Inside the Mind of a CISO |
Erica Azad |
Jun 27, 2024 |
459 |
- |
AI security in 2024: What’s new? |
Bugcrowd |
Apr 03, 2024 |
1789 |
- |
5 Ways to Reduce your Cloud Attack Surface |
Bugcrowd |
Aug 26, 2024 |
1767 |
- |
Know the Warning Signs of “Crowd Washing” |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 07, 2023 |
699 |
- |
Hackers in the White House |
Casey Ellis |
Mar 03, 2023 |
704 |
- |
Defining Cybersecurity Team Colors (and How Bugcrowd Fits In) |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Mar 24, 2022 |
877 |
- |
Understanding Scope for Higher Payouts |
Santerra Holler |
Jun 11, 2024 |
913 |
- |
Introducing LevelUpX – Resources for the Community by the Community |
Santerra Holler |
May 09, 2022 |
279 |
- |
2022 MVP Winner Roundup |
Jordyn Jones |
Mar 21, 2023 |
312 |
- |
The Informational Revolution |
Andy White |
Mar 10, 2021 |
652 |
- |
Breaking News: SEC Adopts New Rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure |
Dave Gerry |
Jul 27, 2023 |
696 |
- |
Asset Discovery: Everything You Should Know |
Bugcrowd |
Aug 22, 2024 |
2224 |
- |
Bugcrowd to Manage Free Vulnerability Disclosure Programs for Australian and New Zealand Government Agencies to Protect Critical Relief Services |
Bugcrowd |
Jul 15, 2021 |
417 |
- |
AI deep dive: Pen testing |
Bugcrowd |
May 14, 2024 |
2083 |
- |
Announcing Continuous Attack Surface Pen Testing from Bugcrowd |
Marios Kyriacou |
Aug 07, 2024 |
650 |
- |
Unsolved Cyber Mysteries Volume 3: Code Red |
Erica Azad |
Nov 30, 2023 |
309 |
- |
The 10 Most Common Bugs of 2021 So Far, and How to Find Them! |
Luke Stephens |
Feb 06, 2021 |
1272 |
- |
The Vegas Bug Bash 2022 Recap! |
Santerra Holler |
Sep 07, 2022 |
389 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #7 |
Bugcrowd Researcher Success |
Jul 06, 2021 |
684 |
- |
Behind the Scenes: Bugcrowd in Times Square |
Samantha Andersson |
Feb 29, 2024 |
1271 |
- |
Bugcrowd Acquires Informer |
Dave Gerry |
May 23, 2024 |
343 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #9 & #10 |
Bugcrowd Researcher Success |
Jul 20, 2021 |
741 |
- |
The Top Five Generative AI Findings from Inside the Mind of a Hacker |
Erica Azad |
Aug 30, 2023 |
228 |
- |
Hacker Cup 2023; Hack Hack Revolution |
Santerra Holler |
Oct 26, 2023 |
817 |
- |
Defining Cyber Attack Liability |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Aug 30, 2022 |
484 |
- |
How to build a secure recon network using Tailscale |
Rami Tawil |
Sep 17, 2024 |
1924 |
- |
Defining and Prioritizing AI Vulnerabilities for Security Testing |
Michael Skelton, VP of Operations |
Dec 19, 2023 |
970 |
- |
How to write an enticing managed bug bounty brief |
Rami Tawil |
Jul 08, 2024 |
2228 |
- |
The Unlikely Romance Between Hackers and CISOs |
Nick McKenzie |
Feb 13, 2024 |
1100 |
- |
10 Essentials to Look for in a Crowdsourced Security Platform |
Erica Azad |
Jul 24, 2023 |
251 |
- |
Bugcrowd’s Annual Buggy Awards are Back |
Jordyn Jones |
Mar 21, 2023 |
1202 |
- |
Axis Communications Reduces Risk with Bugcrowd’s Cybersecurity Platform |
Athena Peterson |
Jun 27, 2023 |
621 |
- |
Vulnerability Disclosure Program or Managed Bug Bounty: How to Determine which Program is Best for You |
Murtaza Hafizji |
Dec 15, 2023 |
1038 |
- |
Builders and Breakers: How Ethical Hackers are Securing Elections |
Casey Ellis |
Apr 30, 2024 |
901 |
- |
Fight the Fear of Shadow and Zombie APIs |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Apr 27, 2022 |
540 |
- |
How Different Hacker Roles Contribute to Crowdsourced Security |
Michael Skelton, VP of Operations |
Mar 22, 2023 |
1109 |
- |
VRT update: What does AI data bias look like? |
Michael Skelton, VP of Operations |
Jul 16, 2024 |
1175 |
- |
Why Attack Surface Discovery Tools Matter |
Bugcrowd |
Sep 05, 2024 |
1137 |
- |
Researcher Spotlight: anhnt1337 |
Jordyn Jones |
Dec 05, 2022 |
2087 |
- |
Tango incentivizes trusted hackers to secure its incentive program |
Bugcrowd Customer Marketing |
Feb 22, 2024 |
523 |
- |
Why Isn’t My Program Getting Submissions? |
Grant McCracken |
Apr 27, 2021 |
2723 |
- |
How CrowdMatch Strengthens Crowd Engagement and Improves Researcher Rewards |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jul 07, 2022 |
558 |
- |
AI vulnerability deep dive: Prompt injection |
Bugcrowd |
Apr 23, 2024 |
2014 |
- |
Bugcrowd’s Latest Funding Tops $100M to Drive New Growth |
Dave Gerry |
Feb 12, 2024 |
461 |
- |
12 Common Attack Vectors you Need to be Aware of |
Bugcrowd |
Aug 15, 2024 |
1858 |
- |
Introducing the new Insights Dashboard |
Kaushik Srinivas |
Aug 28, 2024 |
542 |
- |
How T-Mobile Is Using a New Bug Bounty Program to Keep Customers Safe from Harm |
Bugcrowd Customer Marketing |
Aug 30, 2023 |
1107 |
- |
Investing in Customer Success: Announcing Faster, More Agile Penetration Testing and More |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 15, 2022 |
777 |
- |
Bugcrowd Builds on Momentum with Key Leadership Promotions |
Dave Gerry |
Feb 08, 2024 |
523 |
- |
Why Bug Bounty Payouts Are Worth Far More Than Their Cost |
Matthias Held, Technical Program Manager |
Nov 09, 2023 |
918 |
- |
Is An Open Scope Program Right For Me? |
Santerra Holler |
Aug 31, 2022 |
442 |
- |
Log4Shell, The Worst Java Vulnerability in Years |
Bugcrowd Security Flash |
Dec 13, 2021 |
411 |
- |
The Cybersecurity Skills Gap in a Changing Threat Landscape |
Erica Azad |
Feb 05, 2024 |
542 |
- |
Overview of new cybersecurity regulations and their impact on businesses |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
May 28, 2024 |
1224 |
- |
Rotating pen test vendors: Is it worth it? |
Justin Beachler |
Oct 09, 2024 |
937 |
- |
Attack Surface Management 101: An Essential Guide |
Bugcrowd |
Aug 19, 2024 |
1766 |
- |
Will GPT-Based Chatbots Become A Thing For Malicious Hackers? |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jan 12, 2023 |
440 |
- |
Protecting what Matters: Announcing Enhanced Multi-Factor Authentication (MFA) for Programs |
Abigail Nguy |
Mar 29, 2022 |
285 |
- |
A guide to vulnerability remediation vs mitigation |
Guest Contributor |
Sep 25, 2024 |
1445 |
- |
How to hack with the Flipper Zero |
Bugcrowd |
Aug 27, 2024 |
1768 |
- |
Celebrating 10 years of Bugcrowd |
Bugcrowd |
Sep 07, 2022 |
908 |
- |
How to Regex: A Practical Guide to Regular Expressions (Regex) for Hackers |
Luke Stephens |
Mar 12, 2021 |
1868 |
- |
Looking Back: Inside the Mind of a Hacker 2021 Report |
Bugcrowd |
Jan 25, 2022 |
566 |
- |
Is Foundational Knowledge (Networking, Coding, Linux) Really That Important When Learning to Hack? |
Luke Stephens |
Apr 03, 2021 |
1330 |
- |
How Successful ID Verification Keeps You Safe and Leads to More Opportunity |
Santerra Holler |
May 25, 2023 |
476 |
- |
Configuring Notifications for P1 Response in the Bugcrowd Platform |
Kaushik Srinivas |
Feb 09, 2023 |
265 |
- |
The Kaseya/REvil Attack Explained |
Casey Ellis |
Jul 07, 2021 |
697 |
- |
HEROES WANTED! Hack the Homeland for Challenge Coins |
Michael Hamel |
Oct 02, 2021 |
268 |
- |
Leading the Crowdsourced Security Charge–Bugcrowd 2023 Recap |
Dave Gerry |
Feb 06, 2024 |
843 |
- |
Hacker spotlight: Specters |
Santerra Holler |
May 06, 2024 |
1169 |
- |
Introducing AI Penetration Testing |
Julian Brownlow Davies |
May 01, 2024 |
510 |
- |
How to Succeed in Bug Bounties as a Pentester |
Luke Stephens |
Apr 10, 2021 |
1429 |
- |
Why CISOs Need Complete Attack Surface Visibility |
Bugcrowd |
Aug 20, 2024 |
1677 |
- |
Robyn Denholm on Joining the Bugcrowd Board |
Robyn Denholm |
Aug 04, 2021 |
307 |
- |
Big Bugs: Bitbucket Pipelines Kata Containers Build Container Escape |
Michael Hamel |
Mar 01, 2021 |
2786 |
- |
Unveiling TE.0 HTTP Request Smuggling: Discovering a Critical Vulnerability in Thousands of Google Cloud Websites |
Guest Post |
Jul 17, 2024 |
1672 |
- |
Top 3 Reasons to Adopt Bugcrowd API v4 |
Ryan Clark |
Oct 28, 2021 |
500 |
- |
The Shocking Truth You May Not Know About Being A Full-Time Bug Hunter |
Michael Skelton, VP of Operations |
Jun 25, 2024 |
2128 |
- |
The Power of Numbers: Benefits of Crowdsourced Security Testing |
Bugcrowd |
Dec 01, 2023 |
2016 |
- |
Vulnerability Disclosure Programs: Luxury or Necessity? |
Bugcrowd |
May 26, 2021 |
113 |
- |
6 Steps to Improve Your Security Posture |
Bugcrowd |
Sep 03, 2024 |
1688 |
- |
Bugcrowd’s Log4j Response: Behind the Numbers |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jan 06, 2022 |
490 |
- |
Kiteworks’ New Program Promotion |
Bugcrowd Researcher Success |
Mar 03, 2022 |
399 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #2 |
Bugcrowd Researcher Success |
Jun 08, 2021 |
455 |
- |
New Wave of Legislation Puts Crowdsourced Cybersecurity in the Spotlight |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Oct 11, 2022 |
661 |
- |
The UK’s Computer Misuse Act (1990) is up for revision. It’s time for ethical hackers to submit your views |
Casey Ellis |
Mar 28, 2023 |
412 |
- |
RSA Conference Recap: The Security Impacts of Artificial Intelligence |
Dave Gerry |
May 04, 2023 |
542 |
- |
Partnering with Technical Customer Success Managers at Bugcrowd |
Elle Green |
Feb 28, 2024 |
833 |
- |
What is Offensive Security? |
Bugcrowd |
Jan 25, 2024 |
1910 |
- |
Beyond the Hype: Considerations for Rational, Effective, and Ethical AI Regulation |
Bugcrowd |
Apr 24, 2024 |
2234 |
- |
Why Hack with Bugcrowd? |
Santerra Holler |
May 21, 2024 |
832 |
- |
Security Industry Veteran Braden Russell Joins Bugcrowd as Chief Product Officer |
Bugcrowd |
Aug 27, 2024 |
731 |
- |
Vulnerability Management Lifecycle |
Guest Contributor |
Oct 04, 2024 |
1527 |
- |
Hacker Spotlight: BusesCanFly |
Jordyn Jones |
Jun 27, 2023 |
792 |
- |
Researcher Spotlight: TodayIsNew |
Jordyn Jones |
Jan 09, 2023 |
1126 |
- |
Bugcrowd Security Knowledge Platform Available on Red Hat Marketplace to Help Customers Identify Security Flaws |
Lisa Bergamo |
Apr 21, 2022 |
431 |
- |
5 ways to tell if your bug bounty engagement is successful |
Matias Altamirano |
Sep 24, 2024 |
898 |
- |
3 Steps Rapyd Took to Make its Program Public |
Bugcrowd Customer Marketing |
Feb 14, 2024 |
370 |
- |
The Ransomware “Firehose” Makes Crowdsourced Security a P1 |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Aug 23, 2022 |
705 |
- |
Points don’t matter; Your skills do |
Grant McCracken |
Jul 22, 2021 |
1141 |
- |
BUGCROWD MVPs for Q4! The final quarter of 2020! |
Michael Hamel |
Mar 02, 2021 |
541 |
- |
How to get Private Invites on the Bugcrowd Platform |
Santerra Holler |
May 07, 2024 |
724 |
- |
Bugcrowd at RSA: Meet with the team! |
Bugcrowd |
May 01, 2024 |
466 |
- |
The Inside Scoop from the 2022 Hacker Cup Winners |
Jordyn Jones |
Apr 19, 2023 |
1822 |
- |
Demystifying private invitations for hackers |
Ben Bowen |
Aug 14, 2024 |
1374 |
- |
Announcing Enhancements to Industry Comparison Reports in the Bugcrowd Platform |
Abigail Nguy |
Jan 26, 2023 |
215 |
- |
PrintNightmare: What You Need to Know |
Adam Foster |
Jul 23, 2021 |
556 |
- |
Todayisnew and Hx01 on Collaboration |
Santerra Holler |
Nov 18, 2021 |
1327 |
- |
Bugcrowd PTaaS Takes Home Five Awards for Cybersecurity Excellence |
Dave Gerry |
May 11, 2023 |
399 |
- |
Unsolved Cyber Mysteries Volume 2: The WANK Worm |
Erica Azad |
Oct 18, 2023 |
271 |
- |
Pen Testing vs. Bug Bounty: Which, When, Why |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
May 22, 2024 |
1669 |
- |
Hacker Cup 2023 Recap—Big Payouts, Hacker Collaboration, and Awesome Swag |
Bugcrowd Researcher Success |
Feb 15, 2024 |
362 |
- |
Researcher Spotlight: Hx01 |
Jordyn Jones |
Sep 08, 2022 |
584 |
- |
Demystifying crowdsourced security: How to choose the right engagement for your organization |
Rami Tawil |
Mar 20, 2024 |
1636 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #4 & #5 |
Bugcrowd Researcher Success |
Jun 22, 2021 |
618 |
- |
Welcome George Gerchow of MongoDB to the Bugcrowd Advisory Board |
Erica Azad |
Jul 09, 2024 |
366 |
- |
Researcher Submission Templates |
Bugcrowd Researcher Success |
Jun 08, 2022 |
442 |
- |
Complete Guide to Pentesting |
Bugcrowd |
Feb 16, 2021 |
1952 |
- |
Bugcrowd Named a Leader in GigaOm’s Pen Test as a Service Report |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jan 18, 2023 |
226 |
- |
Making Apps React to Platform Events Through Webhooks |
Eamon O'Neill |
Feb 10, 2022 |
356 |
- |
Welcome Former Google CIO Ben Fried to the Bugcrowd Advisory Board |
Erica Azad |
Jun 19, 2024 |
617 |
- |
Introducing Request a Response: A new standard for hacker and customer response time |
Abigail Nguy |
May 03, 2023 |
631 |
- |
Your Guide to Finding Treasure at Black Hat USA and DEF CON 32 |
Erica Azad |
Jul 31, 2024 |
490 |
- |
Hacker spotlight: Brandon Reynolds |
Santerra Holler |
Mar 13, 2024 |
1149 |
- |
Submissions With Bugcrowd |
Santerra Holler |
Jan 07, 2022 |
185 |
- |
The Trouble with Traditional Penetration Testing |
Bugcrowd |
Aug 06, 2021 |
201 |
- |
Introducing Bugcrowd AI Bias Assessments |
Dave Gerry |
Apr 16, 2024 |
546 |
- |
Platform Collaboration in 5 Easy Steps |
Santerra Holler |
Aug 25, 2021 |
681 |
- |
6 Cybersecurity Red Flags |
Erica Azad |
Aug 02, 2023 |
221 |
- |
2024 Cybersecurity Trends and Predictions |
Casey Ellis |
Dec 27, 2023 |
287 |
- |
Hacker Cup 2022; Bugcrowd Team Hunt |
Jordyn Jones |
Dec 02, 2022 |
577 |
- |
ABP (Always Be Prepared) For Social Engineering Threats |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jun 23, 2022 |
346 |
- |
Your Guide to Bugcrowd Support |
Santerra Holler |
Apr 28, 2022 |
1045 |
- |
Introducing Unsolved Cyber Mysteries and the Case of the Max Headroom Signal Hijacking |
Erica Azad |
Oct 06, 2023 |
431 |
- |
Meet Bugcrowd at Infosecurity Europe 2023 |
Bugcrowd |
Jun 16, 2023 |
233 |
- |
Getting Triage Right for Researchers |
Michael Skelton, VP of Operations |
Nov 10, 2022 |
771 |
- |
What is Penetration Testing as a Service? |
Bugcrowd |
Dec 07, 2023 |
1452 |
- |
The Ultimate Guide to Bugcrowd Incentive Programs |
Michael Hamel |
Apr 16, 2021 |
1033 |
- |
OWASP Top 10: Security threats facing AI systems |
Bugcrowd |
May 14, 2024 |
757 |
- |
The Total Economic Impact™ of Bugcrowd Managed Bug Bounty |
Erica Azad |
Apr 17, 2024 |
652 |
- |
What is an Attack Surface? |
Bugcrowd |
Aug 08, 2024 |
1098 |
- |
Announcing: Industry Comparison Reports |
Murtaza Hafizji |
Apr 05, 2022 |
223 |
- |
AI deep dive: Data bias |
Bugcrowd |
May 07, 2024 |
2186 |
- |
Researcher Spotlight: bl3ep |
Jordyn Jones |
Mar 08, 2023 |
1160 |
- |
Celebrating International Women’s Day at Bugcrowd |
Bugcrowd |
Mar 08, 2021 |
792 |
- |
13 Scary Security Stats that will Haunt You |
Erica Azad |
Oct 17, 2023 |
264 |
- |
Inside the Mind of a Hacker: 2023 Edition |
Erica Azad |
Jul 12, 2023 |
528 |
- |
ZwinK’s Tips and Tricks to Crush Bug Bounty #6 |
Bugcrowd Researcher Success |
Jun 29, 2021 |
569 |
- |
Vulnerability Disclosure Policy: What is It & Why is it Important? |
Bugcrowd |
Dec 15, 2023 |
1374 |
- |
Improving Report Quality through Submission Editing by the Bugcrowd ASE Team |
Michael Hamel |
Jun 10, 2021 |
351 |
- |
3 Key Components of Researcher Submission Templates |
Michael Skelton, VP of Operations |
Jun 14, 2022 |
677 |
- |
New Bugcrowd Platform Features That Save Time and Money |
Abigail Nguy |
Aug 04, 2022 |
654 |
- |
Haunted hardware: Unmasking IoT vulnerabilities |
Erica Azad |
Oct 28, 2024 |
1438 |
- |
What is Quishing? |
Julian Brownlow Davies |
Nov 05, 2024 |
414 |
- |
10 Ways to Save with Bug Bounty |
Bugcrowd |
Jan 28, 2021 |
142 |
- |
Setting up your first hardware hacking lab |
Bugcrowd |
Oct 18, 2024 |
1115 |
- |
Hacker Spotlight: Ads Dawson |
Erica Azad |
Oct 23, 2024 |
913 |
- |
Hacker spotlight: Flaviu |
Santerra Holler |
Oct 15, 2024 |
1538 |
- |
Hacker spotlight: Haddix |
Santerra Holler |
Nov 07, 2024 |
1353 |
- |
The power of automation and collaboration in bug bounty |
Guest Post |
Nov 14, 2024 |
1027 |
- |
How to Hack: A Step-by-Step Journey brought to you by Bugcrowd and Katie Paxton-Fear |
Santerra Holler |
Mar 15, 2023 |
366 |
- |
5 CISO myths, debunked |
Erica Azad |
Jul 17, 2024 |
507 |
- |
Crowdsourced security as a ‘force multiplier’ in the public sector |
Kent Wilson |
Mar 25, 2024 |
701 |
- |
What is AI red teaming? |
Bugcrowd |
Oct 17, 2024 |
1455 |
- |
Inside the Mind of a Hacker: 2024 Edition |
Erica Azad |
Oct 16, 2024 |
561 |
- |
Why you aren’t finding bugs |
Andrew Pratt |
Oct 22, 2024 |
1903 |
- |
This is No Time to Retreat In Cybersecurity |
Nick McKenzie |
Feb 27, 2023 |
558 |
- |
Your guide to common prompt defenses |
Guest Post |
Nov 14, 2024 |
2209 |
- |
Hacker spotlight: Andrew Pratt |
Santerra Holler |
Oct 30, 2024 |
627 |
- |
Bugcrowd Secures $50 Million Growth Capital |
Dave Gerry |
Oct 31, 2024 |
370 |
- |
The Most Significant AI-related Risks in 2024 |
Matthias Held, Technical Program Manager |
Jan 10, 2024 |
2602 |
- |
Cloud and OSS risks have Bug Bounty adoption humming |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Sep 13, 2022 |
595 |
- |
AI deep dive: LLM jailbreaking |
Bugcrowd |
Nov 19, 2024 |
1419 |
- |
The ultimate beginner’s guide to Burp Suite |
Santerra Holler |
Nov 20, 2024 |
3536 |
- |
Machine talk: The long road to understanding payload obfuscation |
Santerra Holler |
Nov 21, 2024 |
4201 |
- |
Welcome to Gapsville! |
Stan Breacherton, Mayor of Gapsville |
Nov 22, 2024 |
608 |
- |
A Security Leader’s Guide to the New Product Liability Directive |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Nov 25, 2024 |
858 |
- |
Hacker spotlight: Rami Tawil |
Santerra Holler |
Nov 26, 2024 |
1363 |
- |
Breaking the Chain: Exploiting OAuth and “forgot password” for account takeover |
Santerra Holler |
Dec 03, 2024 |
2149 |
- |
CISA’s VDP platform annual report, explained |
Kent Wilson |
Dec 04, 2024 |
914 |
- |
How generative AI is changing how cybercrime gangs work |
Alistair G, Director of Red Team Operations |
Dec 11, 2024 |
1387 |
- |
The ultimate beginner’s guide to the Ax Framework |
Santerra Holler |
Dec 10, 2024 |
1873 |
- |
Hacker spotlight: Ninad Mishra |
Santerra Holler |
Dec 12, 2024 |
958 |
- |
The 12 Hacker “Battlestations” of the Holidays |
Erica Azad |
Dec 17, 2024 |
487 |
- |
Something isn’t right in Gapsville |
Guest Contributor |
Dec 18, 2024 |
273 |
- |
2025 cybersecurity predictions |
Erica Azad |
Dec 19, 2024 |
352 |
- |
A guide to Bluetooth Low Energy hacking: Part II |
Andrew Pratt |
Jan 09, 2025 |
2907 |
- |
Taking platform support for CVSS to the next level |
Abigail Nguy |
Jan 14, 2025 |
255 |
- |