Bugcrowd

Founded in 2012. Privately Held.

External links: homepage | docs | blog | jobs | youtube | twitter | linkedin

Crowdsourced security via bug bounties.

Blog posts published by month since the start of

113 total blog posts published.

Switch to word count

Blog content

post title author published words HN
The Power of Bug Bounty Programs in Enhancing PCI-DSS Compliance Justin Kestelyn, Bugcrowd Head of Product Marketing Oct. 01, 2024 689 -
The NIS2 Directive, Explained Gareth O Sullivan Oct. 08, 2024 1450 -
Supply Chain Backdoors, xz/liblzma, CVE-2024-3094, and what we currently know Michael Skelton, VP of Operations Mar. 31, 2024 1741 -
2024 Hacker Showdown: Carnival Of ChAIos Bugcrowd Researcher Success Oct. 10, 2024 670 -
Meet Cooties; Pentester, CTF Enthusiast, and Full-time University Student Santerra Holler Sep. 26, 2024 973 -
What it’s like working at Bugcrowd—As told by the Bugcrowd People Team Vangie Field May. 21, 2024 1098 -
Career advice from women in cybersecurity for International Women’s Day Erica Azad Mar. 08, 2024 894 -
A Hacker’s Guide to Navigating Bugcrowd’s Code of Conduct Declan Murphy Apr. 02, 2024 604 -
Reduce Cyber Risk with Attack Surface Discovery Bugcrowd Sep. 10, 2024 1377 -
The next step in security program management Paddy Cassidy Apr. 04, 2024 875 -
A guide to Bluetooth Low Energy hacking Bugcrowd Sep. 12, 2024 3430 -
Max Pen Tests: Combining the power of pen testing and bug bounty engagements Erica Azad Mar. 06, 2024 536 -
Bugcrowd Platform Behavior Standards Santerra Holler Jun. 04, 2024 1026 -
The Human Attack Surface: A Serious Threat to Cybersecurity Bugcrowd Sep. 12, 2024 1344 -
Shodan: The Search Engine For Hackers Guest Contributor Sep. 18, 2024 1411 -
Get to know the Bugcrowd Security Knowledge Graph Justin Kestelyn, Bugcrowd Head of Product Marketing Feb. 27, 2024 485 -
Top 8 CISO Priorities in 2024 Erica Azad Jul. 10, 2024 813 -
WiFi hacking tools and how to use them Bugcrowd Jul. 24, 2024 1934 -
Learnings from Bugcrowd’s Customer Advisory Board Paul Ciesielski May. 29, 2024 526 -
What is a Bug Bounty Program? Bugcrowd Feb. 20, 2024 1849 -
VRT update: Doubling down on hardware vulnerabilities Michael Skelton, VP of Operations Apr. 09, 2024 1417 -
Introducing VDP Compliance—A Free Offering From Bugcrowd Michael Skelton, VP of Operations May. 02, 2024 610 -
Inside the Platform: Bugcrowd’s Vulnerability Trends Report Erica Azad Jan. 24, 2024 456 -
5 Reasons why Customers Choose the Bugcrowd Platform Murtaza Hafizji Apr. 18, 2024 1014 -
Security Flash: CISA Order to Disconnect Ivanti Products Erica Azad Feb. 01, 2024 293 -
Racing against time: An introduction to race conditions Santerra Holler Aug. 21, 2024 1568 -
What is Bugcrowd’s Hacker Advisory Board? Emma Navajas Aug. 29, 2024 1120 -
A Comprehensive Approach to People Resource Management Paddy Cassidy Oct. 02, 2024 724 -
Score big in Meme Madness Jordyn Jones Mar. 20, 2024 455 -
Attack Surface Management vs Vulnerability Management Bugcrowd Aug. 13, 2024 1994 -
Spotlight: Ross McKerchar, CISO at Sophos Erica Azad Jul. 02, 2024 743 -
The Digital Operational Resilience Act (DORA), Explained Gareth O Sullivan Sep. 05, 2024 1431 -
Pen Testing as a Service now available in Singapore Samantha Andersson Apr. 12, 2024 530 -
Advice for pursuing a cybersecurity career Jordyn Jones Mar. 28, 2024 896 -
Inside the Mind of a CISO Erica Azad Jun. 27, 2024 459 -
AI security in 2024: What’s new? Bugcrowd Apr. 03, 2024 1789 -
5 Ways to Reduce your Cloud Attack Surface Bugcrowd Aug. 26, 2024 1767 -
Understanding Scope for Higher Payouts Santerra Holler Jun. 11, 2024 913 -
Asset Discovery: Everything You Should Know Bugcrowd Aug. 22, 2024 2224 -
AI deep dive: Pen testing Bugcrowd May. 14, 2024 2083 -
Announcing Continuous Attack Surface Pen Testing from Bugcrowd Marios Kyriacou Aug. 07, 2024 650 -
Behind the Scenes: Bugcrowd in Times Square Samantha Andersson Feb. 29, 2024 1271 -
Bugcrowd Acquires Informer Dave Gerry May. 23, 2024 343 -
How to build a secure recon network using Tailscale Rami Tawil Sep. 17, 2024 1924 -
How to write an enticing managed bug bounty brief Rami Tawil Jul. 08, 2024 2228 -
The Unlikely Romance Between Hackers and CISOs Nick McKenzie Feb. 13, 2024 1100 -
Builders and Breakers: How Ethical Hackers are Securing Elections Casey Ellis Apr. 30, 2024 901 -
VRT update: What does AI data bias look like? Michael Skelton, VP of Operations Jul. 16, 2024 1175 -
Why Attack Surface Discovery Tools Matter Bugcrowd Sep. 05, 2024 1137 -
Tango incentivizes trusted hackers to secure its incentive program Bugcrowd Customer Marketing Feb. 22, 2024 523 -
AI vulnerability deep dive: Prompt injection Bugcrowd Apr. 23, 2024 2014 -
Bugcrowd’s Latest Funding Tops $100M to Drive New Growth Dave Gerry Feb. 12, 2024 461 -
12 Common Attack Vectors you Need to be Aware of Bugcrowd Aug. 15, 2024 1858 -
Introducing the new Insights Dashboard Kaushik Srinivas Aug. 28, 2024 542 -
Bugcrowd Builds on Momentum with Key Leadership Promotions Dave Gerry Feb. 08, 2024 523 -
The Cybersecurity Skills Gap in a Changing Threat Landscape Erica Azad Feb. 05, 2024 542 -
Overview of new cybersecurity regulations and their impact on businesses Justin Kestelyn, Bugcrowd Head of Product Marketing May. 28, 2024 1224 -
Rotating pen test vendors: Is it worth it? Justin Beachler Oct. 09, 2024 937 -
Attack Surface Management 101: An Essential Guide Bugcrowd Aug. 19, 2024 1766 -
A guide to vulnerability remediation vs mitigation Guest Contributor Sep. 25, 2024 1445 -
How to hack with the Flipper Zero Bugcrowd Aug. 27, 2024 1768 -
Leading the Crowdsourced Security Charge–Bugcrowd 2023 Recap Dave Gerry Feb. 06, 2024 843 -
Hacker spotlight: Specters Santerra Holler May. 06, 2024 1169 -
Introducing AI Penetration Testing Julian Brownlow Davies May. 01, 2024 510 -
Why CISOs Need Complete Attack Surface Visibility Bugcrowd Aug. 20, 2024 1677 -
Unveiling TE.0 HTTP Request Smuggling: Discovering a Critical Vulnerability in Thousands of Google Cloud Websites Guest Post Jul. 17, 2024 1672 -
The Shocking Truth You May Not Know About Being A Full-Time Bug Hunter Michael Skelton, VP of Operations Jun. 25, 2024 2128 -
6 Steps to Improve Your Security Posture Bugcrowd Sep. 03, 2024 1688 -
Partnering with Technical Customer Success Managers at Bugcrowd Elle Green Feb. 28, 2024 833 -
What is Offensive Security? Bugcrowd Jan. 25, 2024 1910 -
Beyond the Hype: Considerations for Rational, Effective, and Ethical AI Regulation Bugcrowd Apr. 24, 2024 2234 -
Why Hack with Bugcrowd? Santerra Holler May. 21, 2024 832 -
Security Industry Veteran Braden Russell Joins Bugcrowd as Chief Product Officer Bugcrowd Aug. 27, 2024 731 -
Vulnerability Management Lifecycle Guest Contributor Oct. 04, 2024 1527 -
5 ways to tell if your bug bounty engagement is successful Matias Altamirano Sep. 24, 2024 898 -
3 Steps Rapyd Took to Make its Program Public Bugcrowd Customer Marketing Feb. 14, 2024 370 -
How to get Private Invites on the Bugcrowd Platform Santerra Holler May. 07, 2024 724 -
Bugcrowd at RSA: Meet with the team! Bugcrowd May. 01, 2024 466 -
Demystifying private invitations for hackers Ben Bowen Aug. 14, 2024 1374 -
Pen Testing vs. Bug Bounty: Which, When, Why Justin Kestelyn, Bugcrowd Head of Product Marketing May. 22, 2024 1669 -
Hacker Cup 2023 Recap—Big Payouts, Hacker Collaboration, and Awesome Swag Bugcrowd Researcher Success Feb. 15, 2024 362 -
Demystifying crowdsourced security: How to choose the right engagement for your organization Rami Tawil Mar. 20, 2024 1636 -
Welcome George Gerchow of MongoDB to the Bugcrowd Advisory Board Erica Azad Jul. 09, 2024 366 -
Welcome Former Google CIO Ben Fried to the Bugcrowd Advisory Board Erica Azad Jun. 19, 2024 617 -
Your Guide to Finding Treasure at Black Hat USA and DEF CON 32 Erica Azad Jul. 31, 2024 490 -
Hacker spotlight: Brandon Reynolds Santerra Holler Mar. 13, 2024 1149 -
Introducing Bugcrowd AI Bias Assessments Dave Gerry Apr. 16, 2024 546 -
OWASP Top 10: Security threats facing AI systems Bugcrowd May. 14, 2024 757 -
The Total Economic Impact™ of Bugcrowd Managed Bug Bounty Erica Azad Apr. 17, 2024 652 -
What is an Attack Surface? Bugcrowd Aug. 08, 2024 1098 -
AI deep dive: Data bias Bugcrowd May. 07, 2024 2186 -
Haunted hardware: Unmasking IoT vulnerabilities Erica Azad Oct. 28, 2024 1438 -
What is Quishing? Julian Brownlow Davies Nov. 05, 2024 414 -
Setting up your first hardware hacking lab Bugcrowd Oct. 18, 2024 1115 -
Hacker Spotlight: Ads Dawson Erica Azad Oct. 23, 2024 913 -
Hacker spotlight: Flaviu Santerra Holler Oct. 15, 2024 1538 -
Hacker spotlight: Haddix Santerra Holler Nov. 07, 2024 1353 -
The power of automation and collaboration in bug bounty Guest Post Nov. 14, 2024 1027 -
5 CISO myths, debunked Erica Azad Jul. 17, 2024 507 -
Crowdsourced security as a ‘force multiplier’ in the public sector Kent Wilson Mar. 25, 2024 701 -
What is AI red teaming? Bugcrowd Oct. 17, 2024 1455 -
Inside the Mind of a Hacker: 2024 Edition Erica Azad Oct. 16, 2024 561 -
Why you aren’t finding bugs Andrew Pratt Oct. 22, 2024 1903 -
Your guide to common prompt defenses Guest Post Nov. 14, 2024 2209 -
Hacker spotlight: Andrew Pratt Santerra Holler Oct. 30, 2024 627 -
Bugcrowd Secures $50 Million Growth Capital Dave Gerry Oct. 31, 2024 370 -
The Most Significant AI-related Risks in 2024 Matthias Held, Technical Program Manager Jan. 10, 2024 2602 -
AI deep dive: LLM jailbreaking Bugcrowd Nov. 19, 2024 1419 -
The ultimate beginner’s guide to Burp Suite Santerra Holler Nov. 20, 2024 3536 -
Machine talk: The long road to understanding payload obfuscation Santerra Holler Nov. 21, 2024 4201 -
Welcome to Gapsville! Stan Breacherton, Mayor of Gapsville Nov. 22, 2024 608 -
A Security Leader’s Guide to the New Product Liability Directive Justin Kestelyn, Bugcrowd Head of Product Marketing Nov. 25, 2024 858 -
Hacker spotlight: Rami Tawil Santerra Holler Nov. 26, 2024 1363 -

By Matt Makai. 2021-2024.