Bugcrowd

Founded in 2012. Privately Held.

External links: homepage | docs | blog | jobs | youtube | twitter | linkedin

Crowdsourced security via bug bounties.

Blog posts published by month since the start of

216 total blog posts published.

Switch to word count

Blog content

post title author published words HN
The Power of Bug Bounty Programs in Enhancing PCI-DSS Compliance Justin Kestelyn, Bugcrowd Head of Product Marketing Oct. 01, 2024 689 -
Researcher Spotlight: Alexander Pick Santerra Holler Jun. 04, 2022 674 -
Bugcrowd Uncovers Up to 20x More Vulnerabilities for TX Group Lisa Bergamo Nov. 02, 2022 403 -
The 12 Days of Swagmas Erica Azad Dec. 21, 2023 760 -
The NIS2 Directive, Explained Gareth O Sullivan Oct. 08, 2024 1450 -
Supply Chain Backdoors, xz/liblzma, CVE-2024-3094, and what we currently know Michael Skelton, VP of Operations Mar. 31, 2024 1741 -
2024 Hacker Showdown: Carnival Of ChAIos Bugcrowd Researcher Success Oct. 10, 2024 670 -
Researcher Spotlight: Nagli Jordyn Jones Nov. 11, 2022 1218 -
Hacker Spotlight: OrwaGodfather Jordyn Jones Apr. 18, 2023 1576 -
Q&A with Nick McKenzie: CISO Advice, Generative AI, and Security Predictions Erica Azad Aug. 15, 2023 806 -
Meet Cooties; Pentester, CTF Enthusiast, and Full-time University Student Santerra Holler Sep. 26, 2024 973 -
Cybersecurity and Generative AI Predictions with David Fairman, CIO and CSO of Netskope Erica Azad Aug. 08, 2023 905 -
Collaboration, respect, and trust: it’s what makes the crowdsourced security world go round Grant McCracken Apr. 27, 2022 1343 -
Researcher Spotlight: Ankit Singh Jordyn Jones Jun. 30, 2022 1252 -
What it’s like working at Bugcrowd—As told by the Bugcrowd People Team Vangie Field May. 21, 2024 1098 -
Hacker Spotlight: Cinzinga Santerra Holler Sep. 13, 2023 1085 -
Career advice from women in cybersecurity for International Women’s Day Erica Azad Mar. 08, 2024 894 -
A Hacker’s Guide to Navigating Bugcrowd’s Code of Conduct Declan Murphy Apr. 02, 2024 604 -
Reduce Cyber Risk with Attack Surface Discovery Bugcrowd Sep. 10, 2024 1377 -
The next step in security program management Paddy Cassidy Apr. 04, 2024 875 -
ExpressVPN Uses Crowdsourced Security to Continuously Improve its Security Posture Bugcrowd Customer Marketing Oct. 10, 2023 427 -
Security Flash – Cyberattacks on MGM and Caesars Santerra Holler Oct. 12, 2023 790 -
A guide to Bluetooth Low Energy hacking Bugcrowd Sep. 12, 2024 3430 -
Hacker Spotlight: Dipen Santerra Holler Aug. 17, 2023 840 -
Max Pen Tests: Combining the power of pen testing and bug bounty engagements Erica Azad Mar. 06, 2024 536 -
Expert Advice You Don’t Want to Miss Santerra Holler Jan. 04, 2022 1437 -
Standard Pen Tests Are Now Just A Few Clicks Away Kaushik Srinivas Apr. 19, 2023 541 -
Bugcrowd Platform Behavior Standards Santerra Holler Jun. 04, 2024 1026 -
The Human Attack Surface: A Serious Threat to Cybersecurity Bugcrowd Sep. 12, 2024 1344 -
Announcing Multi-tier Program Management on the Bugcrowd Platform Paddy Cassidy Oct. 24, 2022 751 -
Shodan: The Search Engine For Hackers Guest Contributor Sep. 18, 2024 1411 -
Get to know the Bugcrowd Security Knowledge Graph Justin Kestelyn, Bugcrowd Head of Product Marketing Feb. 27, 2024 485 -
Top 8 CISO Priorities in 2024 Erica Azad Jul. 10, 2024 813 -
WiFi hacking tools and how to use them Bugcrowd Jul. 24, 2024 1934 -
Researcher Spotlight: Paolo Arnolfo (sw33tLie) Jordyn Jones Aug. 01, 2022 1212 -
Learnings from Bugcrowd’s Customer Advisory Board Paul Ciesielski May. 29, 2024 526 -
What is Penetration Testing? Samuel Tyler Nov. 16, 2023 2145 -
Hackers Look Ahead To 2023 Santerra Holler Jan. 18, 2023 896 -
What is a Bugcrowd Joinable Program? Santerra Holler May. 11, 2022 376 -
Hackers Wanted for Aleo’s Inaugural Bug Bounty Program! Santerra Holler Jul. 20, 2023 478 -
What is a Bug Bounty Program? Bugcrowd Feb. 20, 2024 1849 -
Metrics for Growing and Improving Your Bug Bounty Program Grant McCracken, VP of Operations Oct. 20, 2022 889 -
Ingenuity Unleashed with Bugcrowd at Black Hat USA 2023 Erica Azad Aug. 01, 2023 494 -
Bugcrowd Earns CSA STAR L1 Certification Rakesh Unnikrishnan Jun. 30, 2023 390 -
7 Rules for Top-notch Web3 Bug Bounty Programs Security Solutions Architecture Team Sep. 21, 2022 1028 -
Announcing Our Latest Vulnerability Rating Taxonomy Update James McLean Nov. 27, 2023 1075 -
VRT update: Doubling down on hardware vulnerabilities Michael Skelton, VP of Operations Apr. 09, 2024 1417 -
Introducing VDP Compliance—A Free Offering From Bugcrowd Michael Skelton, VP of Operations May. 02, 2024 610 -
New UK Legislation Must Protect Good-Faith Hackers Dave Gerry Oct. 23, 2023 551 -
Inside the Platform: Bugcrowd’s Vulnerability Trends Report Erica Azad Jan. 24, 2024 456 -
5 Reasons why Customers Choose the Bugcrowd Platform Murtaza Hafizji Apr. 18, 2024 1014 -
Security Flash: CISA Order to Disconnect Ivanti Products Erica Azad Feb. 01, 2024 293 -
Racing against time: An introduction to race conditions Santerra Holler Aug. 21, 2024 1568 -
Are Cybersecurity Investments Recession-proof? Justin Kestelyn, Bugcrowd Head of Product Marketing Dec. 06, 2022 476 -
The Three Principles of Bug Bounty Duplicates Grant McCracken, VP of Operations Jun. 29, 2023 1759 -
What is Bugcrowd’s Hacker Advisory Board? Emma Navajas Aug. 29, 2024 1120 -
A Comprehensive Approach to People Resource Management Paddy Cassidy Oct. 02, 2024 724 -
Score big in Meme Madness Jordyn Jones Mar. 20, 2024 455 -
Customer Spotlight: Martin Choluj, VP of Security at ClickHouse Bugcrowd Customer Marketing Dec. 14, 2023 471 -
Attack Surface Management vs Vulnerability Management Bugcrowd Aug. 13, 2024 1994 -
Spotlight: Ross McKerchar, CISO at Sophos Erica Azad Jul. 02, 2024 743 -
6 Hot Takes from Black Hat 2023 & DEF CON 31 Erica Azad Aug. 23, 2023 996 -
Announcing our P1 Warriors for 2022 Jordyn Jones Mar. 21, 2023 235 -
Why You Need to Invest in Your Program Health to See the Highest Return Bugcrowd Researcher Success Aug. 25, 2022 1980 -
Researcher Spotlight: Erik de Jong Jordyn Jones Feb. 07, 2023 2045 -
The Digital Operational Resilience Act (DORA), Explained Gareth O Sullivan Sep. 05, 2024 1431 -
Pen Testing as a Service now available in Singapore Samantha Andersson Apr. 12, 2024 530 -
Advice for pursuing a cybersecurity career Jordyn Jones Mar. 28, 2024 896 -
Inside the Mind of a CISO Erica Azad Jun. 27, 2024 459 -
AI security in 2024: What’s new? Bugcrowd Apr. 03, 2024 1789 -
5 Ways to Reduce your Cloud Attack Surface Bugcrowd Aug. 26, 2024 1767 -
Know the Warning Signs of “Crowd Washing” Justin Kestelyn, Bugcrowd Head of Product Marketing Feb. 07, 2023 699 -
Hackers in the White House Casey Ellis Mar. 03, 2023 704 -
Defining Cybersecurity Team Colors (and How Bugcrowd Fits In) Justin Kestelyn, Bugcrowd Head of Product Marketing Mar. 24, 2022 877 -
Understanding Scope for Higher Payouts Santerra Holler Jun. 11, 2024 913 -
Introducing LevelUpX – Resources for the Community by the Community Santerra Holler May. 09, 2022 279 -
2022 MVP Winner Roundup Jordyn Jones Mar. 21, 2023 312 -
Breaking News: SEC Adopts New Rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Dave Gerry Jul. 27, 2023 696 -
Asset Discovery: Everything You Should Know Bugcrowd Aug. 22, 2024 2224 -
AI deep dive: Pen testing Bugcrowd May. 14, 2024 2083 -
Announcing Continuous Attack Surface Pen Testing from Bugcrowd Marios Kyriacou Aug. 07, 2024 650 -
Unsolved Cyber Mysteries Volume 3: Code Red Erica Azad Nov. 30, 2023 309 -
The Vegas Bug Bash 2022 Recap! Santerra Holler Sep. 07, 2022 389 -
Behind the Scenes: Bugcrowd in Times Square Samantha Andersson Feb. 29, 2024 1271 -
Bugcrowd Acquires Informer Dave Gerry May. 23, 2024 343 -
The Top Five Generative AI Findings from Inside the Mind of a Hacker Erica Azad Aug. 30, 2023 228 -
Hacker Cup 2023; Hack Hack Revolution Santerra Holler Oct. 26, 2023 817 -
Defining Cyber Attack Liability Justin Kestelyn, Bugcrowd Head of Product Marketing Aug. 30, 2022 484 -
How to build a secure recon network using Tailscale Rami Tawil Sep. 17, 2024 1924 -
Defining and Prioritizing AI Vulnerabilities for Security Testing Michael Skelton, VP of Operations Dec. 19, 2023 970 -
How to write an enticing managed bug bounty brief Rami Tawil Jul. 08, 2024 2228 -
The Unlikely Romance Between Hackers and CISOs Nick McKenzie Feb. 13, 2024 1100 -
10 Essentials to Look for in a Crowdsourced Security Platform Erica Azad Jul. 24, 2023 251 -
Bugcrowd’s Annual Buggy Awards are Back Jordyn Jones Mar. 21, 2023 1202 -
Axis Communications Reduces Risk with Bugcrowd’s Cybersecurity Platform Athena Peterson Jun. 27, 2023 621 -
Vulnerability Disclosure Program or Managed Bug Bounty: How to Determine which Program is Best for You Murtaza Hafizji Dec. 15, 2023 1038 -
Builders and Breakers: How Ethical Hackers are Securing Elections Casey Ellis Apr. 30, 2024 901 -
Fight the Fear of Shadow and Zombie APIs Justin Kestelyn, Bugcrowd Head of Product Marketing Apr. 27, 2022 540 -
How Different Hacker Roles Contribute to Crowdsourced Security Michael Skelton, VP of Operations Mar. 22, 2023 1109 -
VRT update: What does AI data bias look like? Michael Skelton, VP of Operations Jul. 16, 2024 1175 -
Why Attack Surface Discovery Tools Matter Bugcrowd Sep. 05, 2024 1137 -
Researcher Spotlight: anhnt1337 Jordyn Jones Dec. 05, 2022 2087 -
Tango incentivizes trusted hackers to secure its incentive program Bugcrowd Customer Marketing Feb. 22, 2024 523 -
How CrowdMatch Strengthens Crowd Engagement and Improves Researcher Rewards Justin Kestelyn, Bugcrowd Head of Product Marketing Jul. 07, 2022 558 -
AI vulnerability deep dive: Prompt injection Bugcrowd Apr. 23, 2024 2014 -
Bugcrowd’s Latest Funding Tops $100M to Drive New Growth Dave Gerry Feb. 12, 2024 461 -
12 Common Attack Vectors you Need to be Aware of Bugcrowd Aug. 15, 2024 1858 -
Introducing the new Insights Dashboard Kaushik Srinivas Aug. 28, 2024 542 -
How T-Mobile Is Using a New Bug Bounty Program to Keep Customers Safe from Harm Bugcrowd Customer Marketing Aug. 30, 2023 1107 -
Investing in Customer Success: Announcing Faster, More Agile Penetration Testing and More Justin Kestelyn, Bugcrowd Head of Product Marketing Feb. 15, 2022 777 -
Bugcrowd Builds on Momentum with Key Leadership Promotions Dave Gerry Feb. 08, 2024 523 -
Why Bug Bounty Payouts Are Worth Far More Than Their Cost Matthias Held, Technical Program Manager Nov. 09, 2023 918 -
Is An Open Scope Program Right For Me? Santerra Holler Aug. 31, 2022 442 -
The Cybersecurity Skills Gap in a Changing Threat Landscape Erica Azad Feb. 05, 2024 542 -
Overview of new cybersecurity regulations and their impact on businesses Justin Kestelyn, Bugcrowd Head of Product Marketing May. 28, 2024 1224 -
Rotating pen test vendors: Is it worth it? Justin Beachler Oct. 09, 2024 937 -
Attack Surface Management 101: An Essential Guide Bugcrowd Aug. 19, 2024 1766 -
Will GPT-Based Chatbots Become A Thing For Malicious Hackers? Justin Kestelyn, Bugcrowd Head of Product Marketing Jan. 12, 2023 440 -
Protecting what Matters: Announcing Enhanced Multi-Factor Authentication (MFA) for Programs Abigail Nguy Mar. 29, 2022 285 -
A guide to vulnerability remediation vs mitigation Guest Contributor Sep. 25, 2024 1445 -
How to hack with the Flipper Zero Bugcrowd Aug. 27, 2024 1768 -
Celebrating 10 years of Bugcrowd Bugcrowd Sep. 07, 2022 908 -
Looking Back: Inside the Mind of a Hacker 2021 Report Bugcrowd Jan. 25, 2022 566 -
How Successful ID Verification Keeps You Safe and Leads to More Opportunity Santerra Holler May. 25, 2023 476 -
Configuring Notifications for P1 Response in the Bugcrowd Platform Kaushik Srinivas Feb. 09, 2023 265 -
Leading the Crowdsourced Security Charge–Bugcrowd 2023 Recap Dave Gerry Feb. 06, 2024 843 -
Hacker spotlight: Specters Santerra Holler May. 06, 2024 1169 -
Introducing AI Penetration Testing Julian Brownlow Davies May. 01, 2024 510 -
Why CISOs Need Complete Attack Surface Visibility Bugcrowd Aug. 20, 2024 1677 -
Unveiling TE.0 HTTP Request Smuggling: Discovering a Critical Vulnerability in Thousands of Google Cloud Websites Guest Post Jul. 17, 2024 1672 -
The Shocking Truth You May Not Know About Being A Full-Time Bug Hunter Michael Skelton, VP of Operations Jun. 25, 2024 2128 -
The Power of Numbers: Benefits of Crowdsourced Security Testing Bugcrowd Dec. 01, 2023 2016 -
6 Steps to Improve Your Security Posture Bugcrowd Sep. 03, 2024 1688 -
Bugcrowd’s Log4j Response: Behind the Numbers Justin Kestelyn, Bugcrowd Head of Product Marketing Jan. 06, 2022 490 -
Kiteworks’ New Program Promotion Bugcrowd Researcher Success Mar. 03, 2022 399 -
New Wave of Legislation Puts Crowdsourced Cybersecurity in the Spotlight Justin Kestelyn, Bugcrowd Head of Product Marketing Oct. 11, 2022 661 -
The UK’s Computer Misuse Act (1990) is up for revision. It’s time for ethical hackers to submit your views Casey Ellis Mar. 28, 2023 412 -
RSA Conference Recap: The Security Impacts of Artificial Intelligence Dave Gerry May. 04, 2023 542 -
Partnering with Technical Customer Success Managers at Bugcrowd Elle Green Feb. 28, 2024 833 -
What is Offensive Security? Bugcrowd Jan. 25, 2024 1910 -
Beyond the Hype: Considerations for Rational, Effective, and Ethical AI Regulation Bugcrowd Apr. 24, 2024 2234 -
Why Hack with Bugcrowd? Santerra Holler May. 21, 2024 832 -
Security Industry Veteran Braden Russell Joins Bugcrowd as Chief Product Officer Bugcrowd Aug. 27, 2024 731 -
Vulnerability Management Lifecycle Guest Contributor Oct. 04, 2024 1527 -
Hacker Spotlight: BusesCanFly Jordyn Jones Jun. 27, 2023 792 -
Researcher Spotlight: TodayIsNew Jordyn Jones Jan. 09, 2023 1126 -
Bugcrowd Security Knowledge Platform Available on Red Hat Marketplace to Help Customers Identify Security Flaws Lisa Bergamo Apr. 21, 2022 431 -
5 ways to tell if your bug bounty engagement is successful Matias Altamirano Sep. 24, 2024 898 -
3 Steps Rapyd Took to Make its Program Public Bugcrowd Customer Marketing Feb. 14, 2024 370 -
The Ransomware “Firehose” Makes Crowdsourced Security a P1 Justin Kestelyn, Bugcrowd Head of Product Marketing Aug. 23, 2022 705 -
How to get Private Invites on the Bugcrowd Platform Santerra Holler May. 07, 2024 724 -
Bugcrowd at RSA: Meet with the team! Bugcrowd May. 01, 2024 466 -
The Inside Scoop from the 2022 Hacker Cup Winners Jordyn Jones Apr. 19, 2023 1822 -
Demystifying private invitations for hackers Ben Bowen Aug. 14, 2024 1374 -
Announcing Enhancements to Industry Comparison Reports in the Bugcrowd Platform Abigail Nguy Jan. 26, 2023 215 -
Bugcrowd PTaaS Takes Home Five Awards for Cybersecurity Excellence Dave Gerry May. 11, 2023 399 -
Unsolved Cyber Mysteries Volume 2: The WANK Worm Erica Azad Oct. 18, 2023 271 -
Pen Testing vs. Bug Bounty: Which, When, Why Justin Kestelyn, Bugcrowd Head of Product Marketing May. 22, 2024 1669 -
Hacker Cup 2023 Recap—Big Payouts, Hacker Collaboration, and Awesome Swag Bugcrowd Researcher Success Feb. 15, 2024 362 -
Researcher Spotlight: Hx01 Jordyn Jones Sep. 08, 2022 584 -
Demystifying crowdsourced security: How to choose the right engagement for your organization Rami Tawil Mar. 20, 2024 1636 -
Welcome George Gerchow of MongoDB to the Bugcrowd Advisory Board Erica Azad Jul. 09, 2024 366 -
Researcher Submission Templates Bugcrowd Researcher Success Jun. 08, 2022 442 -
Bugcrowd Named a Leader in GigaOm’s Pen Test as a Service Report Justin Kestelyn, Bugcrowd Head of Product Marketing Jan. 18, 2023 226 -
Making Apps React to Platform Events Through Webhooks Eamon O'Neill Feb. 10, 2022 356 -
Welcome Former Google CIO Ben Fried to the Bugcrowd Advisory Board Erica Azad Jun. 19, 2024 617 -
Introducing Request a Response: A new standard for hacker and customer response time Abigail Nguy May. 03, 2023 631 -
Your Guide to Finding Treasure at Black Hat USA and DEF CON 32 Erica Azad Jul. 31, 2024 490 -
Hacker spotlight: Brandon Reynolds Santerra Holler Mar. 13, 2024 1149 -
Submissions With Bugcrowd Santerra Holler Jan. 07, 2022 185 -
Introducing Bugcrowd AI Bias Assessments Dave Gerry Apr. 16, 2024 546 -
6 Cybersecurity Red Flags Erica Azad Aug. 02, 2023 221 -
2024 Cybersecurity Trends and Predictions Casey Ellis Dec. 27, 2023 287 -
Hacker Cup 2022; Bugcrowd Team Hunt Jordyn Jones Dec. 02, 2022 577 -
ABP (Always Be Prepared) For Social Engineering Threats Justin Kestelyn, Bugcrowd Head of Product Marketing Jun. 23, 2022 346 -
Your Guide to Bugcrowd Support Santerra Holler Apr. 28, 2022 1045 -
Introducing Unsolved Cyber Mysteries and the Case of the Max Headroom Signal Hijacking Erica Azad Oct. 06, 2023 431 -
Meet Bugcrowd at Infosecurity Europe 2023 Bugcrowd Jun. 16, 2023 233 -
Getting Triage Right for Researchers Michael Skelton, VP of Operations Nov. 10, 2022 771 -
What is Penetration Testing as a Service? Bugcrowd Dec. 07, 2023 1452 -
OWASP Top 10: Security threats facing AI systems Bugcrowd May. 14, 2024 757 -
The Total Economic Impact™ of Bugcrowd Managed Bug Bounty Erica Azad Apr. 17, 2024 652 -
What is an Attack Surface? Bugcrowd Aug. 08, 2024 1098 -
Announcing: Industry Comparison Reports Murtaza Hafizji Apr. 05, 2022 223 -
AI deep dive: Data bias Bugcrowd May. 07, 2024 2186 -
Researcher Spotlight: bl3ep Jordyn Jones Mar. 08, 2023 1160 -
13 Scary Security Stats that will Haunt You Erica Azad Oct. 17, 2023 264 -
Inside the Mind of a Hacker: 2023 Edition Erica Azad Jul. 12, 2023 528 -
Vulnerability Disclosure Policy: What is It & Why is it Important? Bugcrowd Dec. 15, 2023 1374 -
3 Key Components of Researcher Submission Templates Michael Skelton, VP of Operations Jun. 14, 2022 677 -
New Bugcrowd Platform Features That Save Time and Money Abigail Nguy Aug. 04, 2022 654 -
Haunted hardware: Unmasking IoT vulnerabilities Erica Azad Oct. 28, 2024 1438 -
What is Quishing? Julian Brownlow Davies Nov. 05, 2024 414 -
Setting up your first hardware hacking lab Bugcrowd Oct. 18, 2024 1115 -
Hacker Spotlight: Ads Dawson Erica Azad Oct. 23, 2024 913 -
Hacker spotlight: Flaviu Santerra Holler Oct. 15, 2024 1538 -
Hacker spotlight: Haddix Santerra Holler Nov. 07, 2024 1353 -
The power of automation and collaboration in bug bounty Guest Post Nov. 14, 2024 1027 -
How to Hack: A Step-by-Step Journey brought to you by Bugcrowd and Katie Paxton-Fear Santerra Holler Mar. 15, 2023 366 -
5 CISO myths, debunked Erica Azad Jul. 17, 2024 507 -
Crowdsourced security as a ‘force multiplier’ in the public sector Kent Wilson Mar. 25, 2024 701 -
What is AI red teaming? Bugcrowd Oct. 17, 2024 1455 -
Inside the Mind of a Hacker: 2024 Edition Erica Azad Oct. 16, 2024 561 -
Why you aren’t finding bugs Andrew Pratt Oct. 22, 2024 1903 -
This is No Time to Retreat In Cybersecurity Nick McKenzie Feb. 27, 2023 558 -
Your guide to common prompt defenses Guest Post Nov. 14, 2024 2209 -
Hacker spotlight: Andrew Pratt Santerra Holler Oct. 30, 2024 627 -
Bugcrowd Secures $50 Million Growth Capital Dave Gerry Oct. 31, 2024 370 -
The Most Significant AI-related Risks in 2024 Matthias Held, Technical Program Manager Jan. 10, 2024 2602 -
Cloud and OSS risks have Bug Bounty adoption humming Justin Kestelyn, Bugcrowd Head of Product Marketing Sep. 13, 2022 595 -
AI deep dive: LLM jailbreaking Bugcrowd Nov. 19, 2024 1419 -
The ultimate beginner’s guide to Burp Suite Santerra Holler Nov. 20, 2024 3536 -
Machine talk: The long road to understanding payload obfuscation Santerra Holler Nov. 21, 2024 4201 -
Welcome to Gapsville! Stan Breacherton, Mayor of Gapsville Nov. 22, 2024 608 -
A Security Leader’s Guide to the New Product Liability Directive Justin Kestelyn, Bugcrowd Head of Product Marketing Nov. 25, 2024 858 -
Hacker spotlight: Rami Tawil Santerra Holler Nov. 26, 2024 1363 -

By Matt Makai. 2021-2024.