The Power of Bug Bounty Programs in Enhancing PCI-DSS Compliance |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Oct 01, 2024 |
689 |
- |
The 12 Days of Swagmas |
Erica Azad |
Dec 21, 2023 |
760 |
- |
The NIS2 Directive, Explained |
Gareth O Sullivan |
Oct 08, 2024 |
1450 |
- |
Supply Chain Backdoors, xz/liblzma, CVE-2024-3094, and what we currently know |
Michael Skelton, VP of Operations |
Mar 31, 2024 |
1741 |
- |
2024 Hacker Showdown: Carnival Of ChAIos |
Bugcrowd Researcher Success |
Oct 10, 2024 |
670 |
- |
Hacker Spotlight: OrwaGodfather |
Jordyn Jones |
Apr 18, 2023 |
1576 |
- |
Q&A with Nick McKenzie: CISO Advice, Generative AI, and Security Predictions |
Erica Azad |
Aug 15, 2023 |
806 |
- |
Meet Cooties; Pentester, CTF Enthusiast, and Full-time University Student |
Santerra Holler |
Sep 26, 2024 |
973 |
- |
Cybersecurity and Generative AI Predictions with David Fairman, CIO and CSO of Netskope |
Erica Azad |
Aug 08, 2023 |
905 |
- |
What it’s like working at Bugcrowd—As told by the Bugcrowd People Team |
Vangie Field |
May 21, 2024 |
1098 |
- |
Hacker Spotlight: Cinzinga |
Santerra Holler |
Sep 13, 2023 |
1085 |
- |
Career advice from women in cybersecurity for International Women’s Day |
Erica Azad |
Mar 08, 2024 |
894 |
- |
A Hacker’s Guide to Navigating Bugcrowd’s Code of Conduct |
Declan Murphy |
Apr 02, 2024 |
604 |
- |
Reduce Cyber Risk with Attack Surface Discovery |
Bugcrowd |
Sep 10, 2024 |
1377 |
- |
The next step in security program management |
Paddy Cassidy |
Apr 04, 2024 |
875 |
- |
ExpressVPN Uses Crowdsourced Security to Continuously Improve its Security Posture |
Bugcrowd Customer Marketing |
Oct 10, 2023 |
427 |
- |
Security Flash – Cyberattacks on MGM and Caesars |
Santerra Holler |
Oct 12, 2023 |
790 |
- |
A guide to Bluetooth Low Energy hacking |
Bugcrowd |
Sep 12, 2024 |
3430 |
- |
Hacker Spotlight: Dipen |
Santerra Holler |
Aug 17, 2023 |
840 |
- |
Max Pen Tests: Combining the power of pen testing and bug bounty engagements |
Erica Azad |
Mar 06, 2024 |
536 |
- |
Standard Pen Tests Are Now Just A Few Clicks Away |
Kaushik Srinivas |
Apr 19, 2023 |
541 |
- |
Bugcrowd Platform Behavior Standards |
Santerra Holler |
Jun 04, 2024 |
1026 |
- |
The Human Attack Surface: A Serious Threat to Cybersecurity |
Bugcrowd |
Sep 12, 2024 |
1344 |
- |
Shodan: The Search Engine For Hackers |
Guest Contributor |
Sep 18, 2024 |
1411 |
- |
Get to know the Bugcrowd Security Knowledge Graph |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 27, 2024 |
485 |
- |
Top 8 CISO Priorities in 2024 |
Erica Azad |
Jul 10, 2024 |
813 |
- |
WiFi hacking tools and how to use them |
Bugcrowd |
Jul 24, 2024 |
1934 |
- |
Learnings from Bugcrowd’s Customer Advisory Board |
Paul Ciesielski |
May 29, 2024 |
526 |
- |
What is Penetration Testing? |
Samuel Tyler |
Nov 16, 2023 |
2145 |
- |
Hackers Look Ahead To 2023 |
Santerra Holler |
Jan 18, 2023 |
896 |
- |
Hackers Wanted for Aleo’s Inaugural Bug Bounty Program! |
Santerra Holler |
Jul 20, 2023 |
478 |
- |
What is a Bug Bounty Program? |
Bugcrowd |
Feb 20, 2024 |
1849 |
- |
Ingenuity Unleashed with Bugcrowd at Black Hat USA 2023 |
Erica Azad |
Aug 01, 2023 |
494 |
- |
Bugcrowd Earns CSA STAR L1 Certification |
Rakesh Unnikrishnan |
Jun 30, 2023 |
390 |
- |
Announcing Our Latest Vulnerability Rating Taxonomy Update |
James McLean |
Nov 27, 2023 |
1075 |
- |
VRT update: Doubling down on hardware vulnerabilities |
Michael Skelton, VP of Operations |
Apr 09, 2024 |
1417 |
- |
Introducing VDP Compliance—A Free Offering From Bugcrowd |
Michael Skelton, VP of Operations |
May 02, 2024 |
610 |
- |
New UK Legislation Must Protect Good-Faith Hackers |
Dave Gerry |
Oct 23, 2023 |
551 |
- |
Inside the Platform: Bugcrowd’s Vulnerability Trends Report |
Erica Azad |
Jan 24, 2024 |
456 |
- |
5 Reasons why Customers Choose the Bugcrowd Platform |
Murtaza Hafizji |
Apr 18, 2024 |
1014 |
- |
Security Flash: CISA Order to Disconnect Ivanti Products |
Erica Azad |
Feb 01, 2024 |
293 |
- |
Racing against time: An introduction to race conditions |
Santerra Holler |
Aug 21, 2024 |
1568 |
- |
The Three Principles of Bug Bounty Duplicates |
Grant McCracken, VP of Operations |
Jun 29, 2023 |
1759 |
- |
What is Bugcrowd’s Hacker Advisory Board? |
Emma Navajas |
Aug 29, 2024 |
1120 |
- |
A Comprehensive Approach to People Resource Management |
Paddy Cassidy |
Oct 02, 2024 |
724 |
- |
Score big in Meme Madness |
Jordyn Jones |
Mar 20, 2024 |
455 |
- |
Customer Spotlight: Martin Choluj, VP of Security at ClickHouse |
Bugcrowd Customer Marketing |
Dec 14, 2023 |
471 |
- |
Attack Surface Management vs Vulnerability Management |
Bugcrowd |
Aug 13, 2024 |
1994 |
- |
Spotlight: Ross McKerchar, CISO at Sophos |
Erica Azad |
Jul 02, 2024 |
743 |
- |
6 Hot Takes from Black Hat 2023 & DEF CON 31 |
Erica Azad |
Aug 23, 2023 |
996 |
- |
Announcing our P1 Warriors for 2022 |
Jordyn Jones |
Mar 21, 2023 |
235 |
- |
Researcher Spotlight: Erik de Jong |
Jordyn Jones |
Feb 07, 2023 |
2045 |
- |
The Digital Operational Resilience Act (DORA), Explained |
Gareth O Sullivan |
Sep 05, 2024 |
1431 |
- |
Pen Testing as a Service now available in Singapore |
Samantha Andersson |
Apr 12, 2024 |
530 |
- |
Advice for pursuing a cybersecurity career |
Jordyn Jones |
Mar 28, 2024 |
896 |
- |
Inside the Mind of a CISO |
Erica Azad |
Jun 27, 2024 |
459 |
- |
AI security in 2024: What’s new? |
Bugcrowd |
Apr 03, 2024 |
1789 |
- |
5 Ways to Reduce your Cloud Attack Surface |
Bugcrowd |
Aug 26, 2024 |
1767 |
- |
Know the Warning Signs of “Crowd Washing” |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 07, 2023 |
699 |
- |
Hackers in the White House |
Casey Ellis |
Mar 03, 2023 |
704 |
- |
Understanding Scope for Higher Payouts |
Santerra Holler |
Jun 11, 2024 |
913 |
- |
2022 MVP Winner Roundup |
Jordyn Jones |
Mar 21, 2023 |
312 |
- |
Breaking News: SEC Adopts New Rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure |
Dave Gerry |
Jul 27, 2023 |
696 |
- |
Asset Discovery: Everything You Should Know |
Bugcrowd |
Aug 22, 2024 |
2224 |
- |
AI deep dive: Pen testing |
Bugcrowd |
May 14, 2024 |
2083 |
- |
Announcing Continuous Attack Surface Pen Testing from Bugcrowd |
Marios Kyriacou |
Aug 07, 2024 |
650 |
- |
Unsolved Cyber Mysteries Volume 3: Code Red |
Erica Azad |
Nov 30, 2023 |
309 |
- |
Behind the Scenes: Bugcrowd in Times Square |
Samantha Andersson |
Feb 29, 2024 |
1271 |
- |
Bugcrowd Acquires Informer |
Dave Gerry |
May 23, 2024 |
343 |
- |
The Top Five Generative AI Findings from Inside the Mind of a Hacker |
Erica Azad |
Aug 30, 2023 |
228 |
- |
Hacker Cup 2023; Hack Hack Revolution |
Santerra Holler |
Oct 26, 2023 |
817 |
- |
How to build a secure recon network using Tailscale |
Rami Tawil |
Sep 17, 2024 |
1924 |
- |
Defining and Prioritizing AI Vulnerabilities for Security Testing |
Michael Skelton, VP of Operations |
Dec 19, 2023 |
970 |
- |
How to write an enticing managed bug bounty brief |
Rami Tawil |
Jul 08, 2024 |
2228 |
- |
The Unlikely Romance Between Hackers and CISOs |
Nick McKenzie |
Feb 13, 2024 |
1100 |
- |
10 Essentials to Look for in a Crowdsourced Security Platform |
Erica Azad |
Jul 24, 2023 |
251 |
- |
Bugcrowd’s Annual Buggy Awards are Back |
Jordyn Jones |
Mar 21, 2023 |
1202 |
- |
Axis Communications Reduces Risk with Bugcrowd’s Cybersecurity Platform |
Athena Peterson |
Jun 27, 2023 |
621 |
- |
Vulnerability Disclosure Program or Managed Bug Bounty: How to Determine which Program is Best for You |
Murtaza Hafizji |
Dec 15, 2023 |
1038 |
- |
Builders and Breakers: How Ethical Hackers are Securing Elections |
Casey Ellis |
Apr 30, 2024 |
901 |
- |
How Different Hacker Roles Contribute to Crowdsourced Security |
Michael Skelton, VP of Operations |
Mar 22, 2023 |
1109 |
- |
VRT update: What does AI data bias look like? |
Michael Skelton, VP of Operations |
Jul 16, 2024 |
1175 |
- |
Why Attack Surface Discovery Tools Matter |
Bugcrowd |
Sep 05, 2024 |
1137 |
- |
Tango incentivizes trusted hackers to secure its incentive program |
Bugcrowd Customer Marketing |
Feb 22, 2024 |
523 |
- |
AI vulnerability deep dive: Prompt injection |
Bugcrowd |
Apr 23, 2024 |
2014 |
- |
Bugcrowd’s Latest Funding Tops $100M to Drive New Growth |
Dave Gerry |
Feb 12, 2024 |
461 |
- |
12 Common Attack Vectors you Need to be Aware of |
Bugcrowd |
Aug 15, 2024 |
1858 |
- |
Introducing the new Insights Dashboard |
Kaushik Srinivas |
Aug 28, 2024 |
542 |
- |
How T-Mobile Is Using a New Bug Bounty Program to Keep Customers Safe from Harm |
Bugcrowd Customer Marketing |
Aug 30, 2023 |
1107 |
- |
Bugcrowd Builds on Momentum with Key Leadership Promotions |
Dave Gerry |
Feb 08, 2024 |
523 |
- |
Why Bug Bounty Payouts Are Worth Far More Than Their Cost |
Matthias Held, Technical Program Manager |
Nov 09, 2023 |
918 |
- |
The Cybersecurity Skills Gap in a Changing Threat Landscape |
Erica Azad |
Feb 05, 2024 |
542 |
- |
Overview of new cybersecurity regulations and their impact on businesses |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
May 28, 2024 |
1224 |
- |
Rotating pen test vendors: Is it worth it? |
Justin Beachler |
Oct 09, 2024 |
937 |
- |
Attack Surface Management 101: An Essential Guide |
Bugcrowd |
Aug 19, 2024 |
1766 |
- |
Will GPT-Based Chatbots Become A Thing For Malicious Hackers? |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jan 12, 2023 |
440 |
- |
A guide to vulnerability remediation vs mitigation |
Guest Contributor |
Sep 25, 2024 |
1445 |
- |
How to hack with the Flipper Zero |
Bugcrowd |
Aug 27, 2024 |
1768 |
- |
How Successful ID Verification Keeps You Safe and Leads to More Opportunity |
Santerra Holler |
May 25, 2023 |
476 |
- |
Configuring Notifications for P1 Response in the Bugcrowd Platform |
Kaushik Srinivas |
Feb 09, 2023 |
265 |
- |
Leading the Crowdsourced Security Charge–Bugcrowd 2023 Recap |
Dave Gerry |
Feb 06, 2024 |
843 |
- |
Hacker spotlight: Specters |
Santerra Holler |
May 06, 2024 |
1169 |
- |
Introducing AI Penetration Testing |
Julian Brownlow Davies |
May 01, 2024 |
510 |
- |
Why CISOs Need Complete Attack Surface Visibility |
Bugcrowd |
Aug 20, 2024 |
1677 |
- |
Unveiling TE.0 HTTP Request Smuggling: Discovering a Critical Vulnerability in Thousands of Google Cloud Websites |
Guest Post |
Jul 17, 2024 |
1672 |
- |
The Shocking Truth You May Not Know About Being A Full-Time Bug Hunter |
Michael Skelton, VP of Operations |
Jun 25, 2024 |
2128 |
- |
The Power of Numbers: Benefits of Crowdsourced Security Testing |
Bugcrowd |
Dec 01, 2023 |
2016 |
- |
6 Steps to Improve Your Security Posture |
Bugcrowd |
Sep 03, 2024 |
1688 |
- |
The UK’s Computer Misuse Act (1990) is up for revision. It’s time for ethical hackers to submit your views |
Casey Ellis |
Mar 28, 2023 |
412 |
- |
RSA Conference Recap: The Security Impacts of Artificial Intelligence |
Dave Gerry |
May 04, 2023 |
542 |
- |
Partnering with Technical Customer Success Managers at Bugcrowd |
Elle Green |
Feb 28, 2024 |
833 |
- |
What is Offensive Security? |
Bugcrowd |
Jan 25, 2024 |
1910 |
- |
Beyond the Hype: Considerations for Rational, Effective, and Ethical AI Regulation |
Bugcrowd |
Apr 24, 2024 |
2234 |
- |
Why Hack with Bugcrowd? |
Santerra Holler |
May 21, 2024 |
832 |
- |
Security Industry Veteran Braden Russell Joins Bugcrowd as Chief Product Officer |
Bugcrowd |
Aug 27, 2024 |
731 |
- |
Vulnerability Management Lifecycle |
Guest Contributor |
Oct 04, 2024 |
1527 |
- |
Hacker Spotlight: BusesCanFly |
Jordyn Jones |
Jun 27, 2023 |
792 |
- |
Researcher Spotlight: TodayIsNew |
Jordyn Jones |
Jan 09, 2023 |
1126 |
- |
5 ways to tell if your bug bounty engagement is successful |
Matias Altamirano |
Sep 24, 2024 |
898 |
- |
3 Steps Rapyd Took to Make its Program Public |
Bugcrowd Customer Marketing |
Feb 14, 2024 |
370 |
- |
How to get Private Invites on the Bugcrowd Platform |
Santerra Holler |
May 07, 2024 |
724 |
- |
Bugcrowd at RSA: Meet with the team! |
Bugcrowd |
May 01, 2024 |
466 |
- |
The Inside Scoop from the 2022 Hacker Cup Winners |
Jordyn Jones |
Apr 19, 2023 |
1822 |
- |
Demystifying private invitations for hackers |
Ben Bowen |
Aug 14, 2024 |
1374 |
- |
Announcing Enhancements to Industry Comparison Reports in the Bugcrowd Platform |
Abigail Nguy |
Jan 26, 2023 |
215 |
- |
Bugcrowd PTaaS Takes Home Five Awards for Cybersecurity Excellence |
Dave Gerry |
May 11, 2023 |
399 |
- |
Unsolved Cyber Mysteries Volume 2: The WANK Worm |
Erica Azad |
Oct 18, 2023 |
271 |
- |
Pen Testing vs. Bug Bounty: Which, When, Why |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
May 22, 2024 |
1669 |
- |
Hacker Cup 2023 Recap—Big Payouts, Hacker Collaboration, and Awesome Swag |
Bugcrowd Researcher Success |
Feb 15, 2024 |
362 |
- |
Demystifying crowdsourced security: How to choose the right engagement for your organization |
Rami Tawil |
Mar 20, 2024 |
1636 |
- |
Welcome George Gerchow of MongoDB to the Bugcrowd Advisory Board |
Erica Azad |
Jul 09, 2024 |
366 |
- |
Bugcrowd Named a Leader in GigaOm’s Pen Test as a Service Report |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Jan 18, 2023 |
226 |
- |
Welcome Former Google CIO Ben Fried to the Bugcrowd Advisory Board |
Erica Azad |
Jun 19, 2024 |
617 |
- |
Introducing Request a Response: A new standard for hacker and customer response time |
Abigail Nguy |
May 03, 2023 |
631 |
- |
Your Guide to Finding Treasure at Black Hat USA and DEF CON 32 |
Erica Azad |
Jul 31, 2024 |
490 |
- |
Hacker spotlight: Brandon Reynolds |
Santerra Holler |
Mar 13, 2024 |
1149 |
- |
Introducing Bugcrowd AI Bias Assessments |
Dave Gerry |
Apr 16, 2024 |
546 |
- |
6 Cybersecurity Red Flags |
Erica Azad |
Aug 02, 2023 |
221 |
- |
2024 Cybersecurity Trends and Predictions |
Casey Ellis |
Dec 27, 2023 |
287 |
- |
Introducing Unsolved Cyber Mysteries and the Case of the Max Headroom Signal Hijacking |
Erica Azad |
Oct 06, 2023 |
431 |
- |
Meet Bugcrowd at Infosecurity Europe 2023 |
Bugcrowd |
Jun 16, 2023 |
233 |
- |
What is Penetration Testing as a Service? |
Bugcrowd |
Dec 07, 2023 |
1452 |
- |
OWASP Top 10: Security threats facing AI systems |
Bugcrowd |
May 14, 2024 |
757 |
- |
The Total Economic Impact™ of Bugcrowd Managed Bug Bounty |
Erica Azad |
Apr 17, 2024 |
652 |
- |
What is an Attack Surface? |
Bugcrowd |
Aug 08, 2024 |
1098 |
- |
AI deep dive: Data bias |
Bugcrowd |
May 07, 2024 |
2186 |
- |
Researcher Spotlight: bl3ep |
Jordyn Jones |
Mar 08, 2023 |
1160 |
- |
13 Scary Security Stats that will Haunt You |
Erica Azad |
Oct 17, 2023 |
264 |
- |
Inside the Mind of a Hacker: 2023 Edition |
Erica Azad |
Jul 12, 2023 |
528 |
- |
Vulnerability Disclosure Policy: What is It & Why is it Important? |
Bugcrowd |
Dec 15, 2023 |
1374 |
- |
Haunted hardware: Unmasking IoT vulnerabilities |
Erica Azad |
Oct 28, 2024 |
1438 |
- |
What is Quishing? |
Julian Brownlow Davies |
Nov 05, 2024 |
414 |
- |
Setting up your first hardware hacking lab |
Bugcrowd |
Oct 18, 2024 |
1115 |
- |
Hacker Spotlight: Ads Dawson |
Erica Azad |
Oct 23, 2024 |
913 |
- |
Hacker spotlight: Flaviu |
Santerra Holler |
Oct 15, 2024 |
1538 |
- |
Hacker spotlight: Haddix |
Santerra Holler |
Nov 07, 2024 |
1353 |
- |
The power of automation and collaboration in bug bounty |
Guest Post |
Nov 14, 2024 |
1027 |
- |
How to Hack: A Step-by-Step Journey brought to you by Bugcrowd and Katie Paxton-Fear |
Santerra Holler |
Mar 15, 2023 |
366 |
- |
5 CISO myths, debunked |
Erica Azad |
Jul 17, 2024 |
507 |
- |
Crowdsourced security as a ‘force multiplier’ in the public sector |
Kent Wilson |
Mar 25, 2024 |
701 |
- |
What is AI red teaming? |
Bugcrowd |
Oct 17, 2024 |
1455 |
- |
Inside the Mind of a Hacker: 2024 Edition |
Erica Azad |
Oct 16, 2024 |
561 |
- |
Why you aren’t finding bugs |
Andrew Pratt |
Oct 22, 2024 |
1903 |
- |
This is No Time to Retreat In Cybersecurity |
Nick McKenzie |
Feb 27, 2023 |
558 |
- |
Your guide to common prompt defenses |
Guest Post |
Nov 14, 2024 |
2209 |
- |
Hacker spotlight: Andrew Pratt |
Santerra Holler |
Oct 30, 2024 |
627 |
- |
Bugcrowd Secures $50 Million Growth Capital |
Dave Gerry |
Oct 31, 2024 |
370 |
- |
The Most Significant AI-related Risks in 2024 |
Matthias Held, Technical Program Manager |
Jan 10, 2024 |
2602 |
- |
AI deep dive: LLM jailbreaking |
Bugcrowd |
Nov 19, 2024 |
1419 |
- |
The ultimate beginner’s guide to Burp Suite |
Santerra Holler |
Nov 20, 2024 |
3536 |
- |
Machine talk: The long road to understanding payload obfuscation |
Santerra Holler |
Nov 21, 2024 |
4201 |
- |
Welcome to Gapsville! |
Stan Breacherton, Mayor of Gapsville |
Nov 22, 2024 |
608 |
- |
A Security Leader’s Guide to the New Product Liability Directive |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Nov 25, 2024 |
858 |
- |
Hacker spotlight: Rami Tawil |
Santerra Holler |
Nov 26, 2024 |
1363 |
- |
Breaking the Chain: Exploiting OAuth and “forgot password” for account takeover |
Santerra Holler |
Dec 03, 2024 |
2149 |
- |
CISA’s VDP platform annual report, explained |
Kent Wilson |
Dec 04, 2024 |
914 |
- |
How generative AI is changing how cybercrime gangs work |
Alistair G, Director of Red Team Operations |
Dec 11, 2024 |
1387 |
- |
The ultimate beginner’s guide to the Ax Framework |
Santerra Holler |
Dec 10, 2024 |
1873 |
- |
Hacker spotlight: Ninad Mishra |
Santerra Holler |
Dec 12, 2024 |
958 |
- |
The 12 Hacker “Battlestations” of the Holidays |
Erica Azad |
Dec 17, 2024 |
487 |
- |
Something isn’t right in Gapsville |
Guest Contributor |
Dec 18, 2024 |
273 |
- |
2025 cybersecurity predictions |
Erica Azad |
Dec 19, 2024 |
352 |
- |
A guide to Bluetooth Low Energy hacking: Part II |
Andrew Pratt |
Jan 09, 2025 |
2907 |
- |
Taking platform support for CVSS to the next level |
Abigail Nguy |
Jan 14, 2025 |
255 |
- |