A guide to Bluetooth Low Energy hacking: Part II |
Andrew Pratt |
Jan 09, 2025 |
2907 |
- |
Taking platform support for CVSS to the next level |
Abigail Nguy |
Jan 14, 2025 |
255 |
- |
Shaping the future of cybersecurity: The Hacking Policy Council’s 2024 achievements and vision for 2025 |
Casey Ellis |
Jan 15, 2025 |
1148 |
- |
Security flash: Salt Typhoon |
Erica Azad |
Jan 16, 2025 |
386 |
- |
Bugcrowd’s Bugboss Fighter Challenge |
Santerra Holler |
Jan 21, 2025 |
286 |
- |
MFA security part 1: How attackers bypass multi-factor authentication |
Alistair G, Director of Red Team Operations |
Jan 22, 2025 |
2100 |
- |
Managing the cost implications of EU DORA compliance |
Julian Brownlow Davies |
Jan 23, 2025 |
1064 |
- |
The new (de)regulated AI security space: A hacker’s perspective |
Guest Post |
Jan 27, 2025 |
1310 |
- |
Hacking Crypto Part I |
Nerdwell |
Jan 30, 2025 |
4781 |
- |
The EU Cyber Resilience Act (CRA), explained |
Gareth O Sullivan |
Feb 11, 2025 |
923 |
- |
Continuous security testing for DORA compliance |
Julian Brownlow Davies |
Jan 29, 2025 |
989 |
- |
The EU AI Act, explained |
Gareth O Sullivan |
Feb 06, 2025 |
890 |
- |
MFA security part 2: How to prevent MFA bypass |
Alistair G, Director of Red Team Operations |
Feb 11, 2025 |
626 |
- |
Point-in-time vs. continuous penetration testing: A comparison guide |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Feb 03, 2025 |
891 |
- |
Hacker spotlight: Meet Nerdwell |
Santerra Holler |
Feb 05, 2025 |
1531 |
- |
Crowdsourced intelligence in action: Bugcrowd’s 2024 year in review |
Dave Gerry |
Feb 04, 2025 |
943 |
- |
The ultimate beginner’s guide to Nuclei |
Andrew Pratt |
Feb 13, 2025 |
2550 |
- |
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update |
Paddy Cassidy |
Feb 12, 2025 |
553 |
- |
Bugcrowd security flash: CFAA and thought crime |
Erica Azad |
Feb 13, 2025 |
558 |
- |
How to hack WiFi |
Andrew Pratt |
Feb 26, 2025 |
2831 |
- |
Hacker Experience Surveys: Amplifying your voice at Bugcrowd |
Emma |
Feb 19, 2025 |
1415 |
- |
A look inside global collegiate pen testing |
Bugcrowd |
Feb 21, 2025 |
1990 |
- |
Hacking crypto part II: Hacking blockchains for fun and profit |
Nerdwell |
Feb 20, 2025 |
4070 |
- |
The biggest security risks facing the maritime shipping industry |
Julian Brownlow Davies |
Feb 27, 2025 |
1191 |
- |
Hacking LLM applications: A meticulous hacker’s two cents |
Guest Post |
Feb 27, 2025 |
3438 |
- |
A hacker breaks down Netflix’s new show, Zero Day |
Guest Contributor |
Mar 06, 2025 |
1900 |
- |
What you need to know about H.R. 872 |
Casey Ellis |
Mar 06, 2025 |
488 |
- |
Hardware hacking with the University of New Brunswick Cybersec Club |
Bugcrowd Researcher Success |
Mar 04, 2025 |
705 |
- |
Secure by Design: From pledge to practice |
Casey Ellis |
Mar 05, 2025 |
665 |
- |
Best practices to avoid Bugcrowd platform violations |
Guest Post |
Mar 12, 2025 |
1112 |
- |
The rise of device code phishing |
Alistair G, Director of Red Team Operations |
Mar 11, 2025 |
1407 |
- |
Safe harbor and the future of AI flaw reporting: Lessons from vulnerability disclosure |
Casey Ellis |
Mar 13, 2025 |
1142 |
- |
Announcing the new women-only hacking community: HackerHER Network |
Emma |
Mar 13, 2025 |
809 |
- |
Red teaming vs. penetration testing: A guide to comprehensive security testing |
Justin Kestelyn, Bugcrowd Head of Product Marketing |
Mar 13, 2025 |
1656 |
- |
Why AI will never replace the Crowd |
Julian Brownlow Davies |
Mar 19, 2025 |
899 |
- |
Remote code execution (RCE) 101 |
Guest Post |
Mar 26, 2025 |
1092 |
- |
A low-cost hacking sidekick: Baby steps to using offensive AI agents |
Ads Dawson |
Mar 27, 2025 |
3235 |
- |