184 blog posts published by month since the start of 2023. Start from a different year:

Posts year-to-date
2 (3 posts by this month last year.)
Average posts per month since 2023
5.1

Post details (2023 to today)

Title Author Date Word count HN points
The Power of Bug Bounty Programs in Enhancing PCI-DSS Compliance Justin Kestelyn, Bugcrowd Head of Product Marketing Oct 01, 2024 689 -
The 12 Days of Swagmas Erica Azad Dec 21, 2023 760 -
The NIS2 Directive, Explained Gareth O Sullivan Oct 08, 2024 1450 -
Supply Chain Backdoors, xz/liblzma, CVE-2024-3094, and what we currently know Michael Skelton, VP of Operations Mar 31, 2024 1741 -
2024 Hacker Showdown: Carnival Of ChAIos Bugcrowd Researcher Success Oct 10, 2024 670 -
Hacker Spotlight: OrwaGodfather Jordyn Jones Apr 18, 2023 1576 -
Q&A with Nick McKenzie: CISO Advice, Generative AI, and Security Predictions Erica Azad Aug 15, 2023 806 -
Meet Cooties; Pentester, CTF Enthusiast, and Full-time University Student Santerra Holler Sep 26, 2024 973 -
Cybersecurity and Generative AI Predictions with David Fairman, CIO and CSO of Netskope Erica Azad Aug 08, 2023 905 -
What it’s like working at Bugcrowd—As told by the Bugcrowd People Team Vangie Field May 21, 2024 1098 -
Hacker Spotlight: Cinzinga Santerra Holler Sep 13, 2023 1085 -
Career advice from women in cybersecurity for International Women’s Day Erica Azad Mar 08, 2024 894 -
A Hacker’s Guide to Navigating Bugcrowd’s Code of Conduct Declan Murphy Apr 02, 2024 604 -
Reduce Cyber Risk with Attack Surface Discovery Bugcrowd Sep 10, 2024 1377 -
The next step in security program management Paddy Cassidy Apr 04, 2024 875 -
ExpressVPN Uses Crowdsourced Security to Continuously Improve its Security Posture Bugcrowd Customer Marketing Oct 10, 2023 427 -
Security Flash – Cyberattacks on MGM and Caesars Santerra Holler Oct 12, 2023 790 -
A guide to Bluetooth Low Energy hacking Bugcrowd Sep 12, 2024 3430 -
Hacker Spotlight: Dipen Santerra Holler Aug 17, 2023 840 -
Max Pen Tests: Combining the power of pen testing and bug bounty engagements Erica Azad Mar 06, 2024 536 -
Standard Pen Tests Are Now Just A Few Clicks Away Kaushik Srinivas Apr 19, 2023 541 -
Bugcrowd Platform Behavior Standards Santerra Holler Jun 04, 2024 1026 -
The Human Attack Surface: A Serious Threat to Cybersecurity Bugcrowd Sep 12, 2024 1344 -
Shodan: The Search Engine For Hackers Guest Contributor Sep 18, 2024 1411 -
Get to know the Bugcrowd Security Knowledge Graph Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 27, 2024 485 -
Top 8 CISO Priorities in 2024 Erica Azad Jul 10, 2024 813 -
WiFi hacking tools and how to use them Bugcrowd Jul 24, 2024 1934 -
Learnings from Bugcrowd’s Customer Advisory Board Paul Ciesielski May 29, 2024 526 -
What is Penetration Testing? Samuel Tyler Nov 16, 2023 2145 -
Hackers Look Ahead To 2023 Santerra Holler Jan 18, 2023 896 -
Hackers Wanted for Aleo’s Inaugural Bug Bounty Program! Santerra Holler Jul 20, 2023 478 -
What is a Bug Bounty Program? Bugcrowd Feb 20, 2024 1849 -
Ingenuity Unleashed with Bugcrowd at Black Hat USA 2023 Erica Azad Aug 01, 2023 494 -
Bugcrowd Earns CSA STAR L1 Certification Rakesh Unnikrishnan Jun 30, 2023 390 -
Announcing Our Latest Vulnerability Rating Taxonomy Update James McLean Nov 27, 2023 1075 -
VRT update: Doubling down on hardware vulnerabilities Michael Skelton, VP of Operations Apr 09, 2024 1417 -
Introducing VDP Compliance—A Free Offering From Bugcrowd Michael Skelton, VP of Operations May 02, 2024 610 -
New UK Legislation Must Protect Good-Faith Hackers Dave Gerry Oct 23, 2023 551 -
Inside the Platform: Bugcrowd’s Vulnerability Trends Report Erica Azad Jan 24, 2024 456 -
5 Reasons why Customers Choose the Bugcrowd Platform Murtaza Hafizji Apr 18, 2024 1014 -
Security Flash: CISA Order to Disconnect Ivanti Products Erica Azad Feb 01, 2024 293 -
Racing against time: An introduction to race conditions Santerra Holler Aug 21, 2024 1568 -
The Three Principles of Bug Bounty Duplicates Grant McCracken, VP of Operations Jun 29, 2023 1759 -
What is Bugcrowd’s Hacker Advisory Board? Emma Navajas Aug 29, 2024 1120 -
A Comprehensive Approach to People Resource Management Paddy Cassidy Oct 02, 2024 724 -
Score big in Meme Madness Jordyn Jones Mar 20, 2024 455 -
Customer Spotlight: Martin Choluj, VP of Security at ClickHouse Bugcrowd Customer Marketing Dec 14, 2023 471 -
Attack Surface Management vs Vulnerability Management Bugcrowd Aug 13, 2024 1994 -
Spotlight: Ross McKerchar, CISO at Sophos Erica Azad Jul 02, 2024 743 -
6 Hot Takes from Black Hat 2023 & DEF CON 31 Erica Azad Aug 23, 2023 996 -
Announcing our P1 Warriors for 2022 Jordyn Jones Mar 21, 2023 235 -
Researcher Spotlight: Erik de Jong Jordyn Jones Feb 07, 2023 2045 -
The Digital Operational Resilience Act (DORA), Explained Gareth O Sullivan Sep 05, 2024 1431 -
Pen Testing as a Service now available in Singapore Samantha Andersson Apr 12, 2024 530 -
Advice for pursuing a cybersecurity career Jordyn Jones Mar 28, 2024 896 -
Inside the Mind of a CISO Erica Azad Jun 27, 2024 459 -
AI security in 2024: What’s new? Bugcrowd Apr 03, 2024 1789 -
5 Ways to Reduce your Cloud Attack Surface Bugcrowd Aug 26, 2024 1767 -
Know the Warning Signs of “Crowd Washing” Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 07, 2023 699 -
Hackers in the White House Casey Ellis Mar 03, 2023 704 -
Understanding Scope for Higher Payouts Santerra Holler Jun 11, 2024 913 -
2022 MVP Winner Roundup Jordyn Jones Mar 21, 2023 312 -
Breaking News: SEC Adopts New Rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Dave Gerry Jul 27, 2023 696 -
Asset Discovery: Everything You Should Know Bugcrowd Aug 22, 2024 2224 -
AI deep dive: Pen testing Bugcrowd May 14, 2024 2083 -
Announcing Continuous Attack Surface Pen Testing from Bugcrowd Marios Kyriacou Aug 07, 2024 650 -
Unsolved Cyber Mysteries Volume 3: Code Red Erica Azad Nov 30, 2023 309 -
Behind the Scenes: Bugcrowd in Times Square Samantha Andersson Feb 29, 2024 1271 -
Bugcrowd Acquires Informer Dave Gerry May 23, 2024 343 -
The Top Five Generative AI Findings from Inside the Mind of a Hacker Erica Azad Aug 30, 2023 228 -
Hacker Cup 2023; Hack Hack Revolution Santerra Holler Oct 26, 2023 817 -
How to build a secure recon network using Tailscale Rami Tawil Sep 17, 2024 1924 -
Defining and Prioritizing AI Vulnerabilities for Security Testing Michael Skelton, VP of Operations Dec 19, 2023 970 -
How to write an enticing managed bug bounty brief Rami Tawil Jul 08, 2024 2228 -
The Unlikely Romance Between Hackers and CISOs Nick McKenzie Feb 13, 2024 1100 -
10 Essentials to Look for in a Crowdsourced Security Platform Erica Azad Jul 24, 2023 251 -
Bugcrowd’s Annual Buggy Awards are Back Jordyn Jones Mar 21, 2023 1202 -
Axis Communications Reduces Risk with Bugcrowd’s Cybersecurity Platform Athena Peterson Jun 27, 2023 621 -
Vulnerability Disclosure Program or Managed Bug Bounty: How to Determine which Program is Best for You Murtaza Hafizji Dec 15, 2023 1038 -
Builders and Breakers: How Ethical Hackers are Securing Elections Casey Ellis Apr 30, 2024 901 -
How Different Hacker Roles Contribute to Crowdsourced Security Michael Skelton, VP of Operations Mar 22, 2023 1109 -
VRT update: What does AI data bias look like? Michael Skelton, VP of Operations Jul 16, 2024 1175 -
Why Attack Surface Discovery Tools Matter Bugcrowd Sep 05, 2024 1137 -
Tango incentivizes trusted hackers to secure its incentive program Bugcrowd Customer Marketing Feb 22, 2024 523 -
AI vulnerability deep dive: Prompt injection Bugcrowd Apr 23, 2024 2014 -
Bugcrowd’s Latest Funding Tops $100M to Drive New Growth Dave Gerry Feb 12, 2024 461 -
12 Common Attack Vectors you Need to be Aware of Bugcrowd Aug 15, 2024 1858 -
Introducing the new Insights Dashboard Kaushik Srinivas Aug 28, 2024 542 -
How T-Mobile Is Using a New Bug Bounty Program to Keep Customers Safe from Harm Bugcrowd Customer Marketing Aug 30, 2023 1107 -
Bugcrowd Builds on Momentum with Key Leadership Promotions Dave Gerry Feb 08, 2024 523 -
Why Bug Bounty Payouts Are Worth Far More Than Their Cost Matthias Held, Technical Program Manager Nov 09, 2023 918 -
The Cybersecurity Skills Gap in a Changing Threat Landscape Erica Azad Feb 05, 2024 542 -
Overview of new cybersecurity regulations and their impact on businesses Justin Kestelyn, Bugcrowd Head of Product Marketing May 28, 2024 1224 -
Rotating pen test vendors: Is it worth it? Justin Beachler Oct 09, 2024 937 -
Attack Surface Management 101: An Essential Guide Bugcrowd Aug 19, 2024 1766 -
Will GPT-Based Chatbots Become A Thing For Malicious Hackers? Justin Kestelyn, Bugcrowd Head of Product Marketing Jan 12, 2023 440 -
A guide to vulnerability remediation vs mitigation Guest Contributor Sep 25, 2024 1445 -
How to hack with the Flipper Zero Bugcrowd Aug 27, 2024 1768 -
How Successful ID Verification Keeps You Safe and Leads to More Opportunity Santerra Holler May 25, 2023 476 -
Configuring Notifications for P1 Response in the Bugcrowd Platform Kaushik Srinivas Feb 09, 2023 265 -
Leading the Crowdsourced Security Charge–Bugcrowd 2023 Recap Dave Gerry Feb 06, 2024 843 -
Hacker spotlight: Specters Santerra Holler May 06, 2024 1169 -
Introducing AI Penetration Testing Julian Brownlow Davies May 01, 2024 510 -
Why CISOs Need Complete Attack Surface Visibility Bugcrowd Aug 20, 2024 1677 -
Unveiling TE.0 HTTP Request Smuggling: Discovering a Critical Vulnerability in Thousands of Google Cloud Websites Guest Post Jul 17, 2024 1672 -
The Shocking Truth You May Not Know About Being A Full-Time Bug Hunter Michael Skelton, VP of Operations Jun 25, 2024 2128 -
The Power of Numbers: Benefits of Crowdsourced Security Testing Bugcrowd Dec 01, 2023 2016 -
6 Steps to Improve Your Security Posture Bugcrowd Sep 03, 2024 1688 -
The UK’s Computer Misuse Act (1990) is up for revision. It’s time for ethical hackers to submit your views Casey Ellis Mar 28, 2023 412 -
RSA Conference Recap: The Security Impacts of Artificial Intelligence Dave Gerry May 04, 2023 542 -
Partnering with Technical Customer Success Managers at Bugcrowd Elle Green Feb 28, 2024 833 -
What is Offensive Security? Bugcrowd Jan 25, 2024 1910 -
Beyond the Hype: Considerations for Rational, Effective, and Ethical AI Regulation Bugcrowd Apr 24, 2024 2234 -
Why Hack with Bugcrowd? Santerra Holler May 21, 2024 832 -
Security Industry Veteran Braden Russell Joins Bugcrowd as Chief Product Officer Bugcrowd Aug 27, 2024 731 -
Vulnerability Management Lifecycle Guest Contributor Oct 04, 2024 1527 -
Hacker Spotlight: BusesCanFly Jordyn Jones Jun 27, 2023 792 -
Researcher Spotlight: TodayIsNew Jordyn Jones Jan 09, 2023 1126 -
5 ways to tell if your bug bounty engagement is successful Matias Altamirano Sep 24, 2024 898 -
3 Steps Rapyd Took to Make its Program Public Bugcrowd Customer Marketing Feb 14, 2024 370 -
How to get Private Invites on the Bugcrowd Platform Santerra Holler May 07, 2024 724 -
Bugcrowd at RSA: Meet with the team! Bugcrowd May 01, 2024 466 -
The Inside Scoop from the 2022 Hacker Cup Winners Jordyn Jones Apr 19, 2023 1822 -
Demystifying private invitations for hackers Ben Bowen Aug 14, 2024 1374 -
Announcing Enhancements to Industry Comparison Reports in the Bugcrowd Platform Abigail Nguy Jan 26, 2023 215 -
Bugcrowd PTaaS Takes Home Five Awards for Cybersecurity Excellence Dave Gerry May 11, 2023 399 -
Unsolved Cyber Mysteries Volume 2: The WANK Worm Erica Azad Oct 18, 2023 271 -
Pen Testing vs. Bug Bounty: Which, When, Why Justin Kestelyn, Bugcrowd Head of Product Marketing May 22, 2024 1669 -
Hacker Cup 2023 Recap—Big Payouts, Hacker Collaboration, and Awesome Swag Bugcrowd Researcher Success Feb 15, 2024 362 -
Demystifying crowdsourced security: How to choose the right engagement for your organization Rami Tawil Mar 20, 2024 1636 -
Welcome George Gerchow of MongoDB to the Bugcrowd Advisory Board Erica Azad Jul 09, 2024 366 -
Bugcrowd Named a Leader in GigaOm’s Pen Test as a Service Report Justin Kestelyn, Bugcrowd Head of Product Marketing Jan 18, 2023 226 -
Welcome Former Google CIO Ben Fried to the Bugcrowd Advisory Board Erica Azad Jun 19, 2024 617 -
Introducing Request a Response: A new standard for hacker and customer response time Abigail Nguy May 03, 2023 631 -
Your Guide to Finding Treasure at Black Hat USA and DEF CON 32 Erica Azad Jul 31, 2024 490 -
Hacker spotlight: Brandon Reynolds Santerra Holler Mar 13, 2024 1149 -
Introducing Bugcrowd AI Bias Assessments Dave Gerry Apr 16, 2024 546 -
6 Cybersecurity Red Flags Erica Azad Aug 02, 2023 221 -
2024 Cybersecurity Trends and Predictions Casey Ellis Dec 27, 2023 287 -
Introducing Unsolved Cyber Mysteries and the Case of the Max Headroom Signal Hijacking Erica Azad Oct 06, 2023 431 -
Meet Bugcrowd at Infosecurity Europe 2023 Bugcrowd Jun 16, 2023 233 -
What is Penetration Testing as a Service? Bugcrowd Dec 07, 2023 1452 -
OWASP Top 10: Security threats facing AI systems Bugcrowd May 14, 2024 757 -
The Total Economic Impact™ of Bugcrowd Managed Bug Bounty Erica Azad Apr 17, 2024 652 -
What is an Attack Surface? Bugcrowd Aug 08, 2024 1098 -
AI deep dive: Data bias Bugcrowd May 07, 2024 2186 -
Researcher Spotlight: bl3ep Jordyn Jones Mar 08, 2023 1160 -
13 Scary Security Stats that will Haunt You Erica Azad Oct 17, 2023 264 -
Inside the Mind of a Hacker: 2023 Edition Erica Azad Jul 12, 2023 528 -
Vulnerability Disclosure Policy: What is It & Why is it Important? Bugcrowd Dec 15, 2023 1374 -
Haunted hardware: Unmasking IoT vulnerabilities Erica Azad Oct 28, 2024 1438 -
What is Quishing? Julian Brownlow Davies Nov 05, 2024 414 -
Setting up your first hardware hacking lab Bugcrowd Oct 18, 2024 1115 -
Hacker Spotlight: Ads Dawson Erica Azad Oct 23, 2024 913 -
Hacker spotlight: Flaviu Santerra Holler Oct 15, 2024 1538 -
Hacker spotlight: Haddix Santerra Holler Nov 07, 2024 1353 -
The power of automation and collaboration in bug bounty Guest Post Nov 14, 2024 1027 -
How to Hack: A Step-by-Step Journey brought to you by Bugcrowd and Katie Paxton-Fear Santerra Holler Mar 15, 2023 366 -
5 CISO myths, debunked Erica Azad Jul 17, 2024 507 -
Crowdsourced security as a ‘force multiplier’ in the public sector Kent Wilson Mar 25, 2024 701 -
What is AI red teaming? Bugcrowd Oct 17, 2024 1455 -
Inside the Mind of a Hacker: 2024 Edition Erica Azad Oct 16, 2024 561 -
Why you aren’t finding bugs Andrew Pratt Oct 22, 2024 1903 -
This is No Time to Retreat In Cybersecurity Nick McKenzie Feb 27, 2023 558 -
Your guide to common prompt defenses Guest Post Nov 14, 2024 2209 -
Hacker spotlight: Andrew Pratt Santerra Holler Oct 30, 2024 627 -
Bugcrowd Secures $50 Million Growth Capital Dave Gerry Oct 31, 2024 370 -
The Most Significant AI-related Risks in 2024 Matthias Held, Technical Program Manager Jan 10, 2024 2602 -
AI deep dive: LLM jailbreaking Bugcrowd Nov 19, 2024 1419 -
The ultimate beginner’s guide to Burp Suite Santerra Holler Nov 20, 2024 3536 -
Machine talk: The long road to understanding payload obfuscation Santerra Holler Nov 21, 2024 4201 -
Welcome to Gapsville! Stan Breacherton, Mayor of Gapsville Nov 22, 2024 608 -
A Security Leader’s Guide to the New Product Liability Directive Justin Kestelyn, Bugcrowd Head of Product Marketing Nov 25, 2024 858 -
Hacker spotlight: Rami Tawil Santerra Holler Nov 26, 2024 1363 -
Breaking the Chain: Exploiting OAuth and “forgot password” for account takeover Santerra Holler Dec 03, 2024 2149 -
CISA’s VDP platform annual report, explained Kent Wilson Dec 04, 2024 914 -
How generative AI is changing how cybercrime gangs work Alistair G, Director of Red Team Operations Dec 11, 2024 1387 -
The ultimate beginner’s guide to the Ax Framework Santerra Holler Dec 10, 2024 1873 -
Hacker spotlight: Ninad Mishra Santerra Holler Dec 12, 2024 958 -
The 12 Hacker “Battlestations” of the Holidays Erica Azad Dec 17, 2024 487 -
Something isn’t right in Gapsville Guest Contributor Dec 18, 2024 273 -
2025 cybersecurity predictions Erica Azad Dec 19, 2024 352 -
A guide to Bluetooth Low Energy hacking: Part II Andrew Pratt Jan 09, 2025 2907 -
Taking platform support for CVSS to the next level Abigail Nguy Jan 14, 2025 255 -