37 blog posts published by month since the start of 2025. Start from a different year:

Posts year-to-date
37 (35 posts by this month last year.)
Average posts per month since 2025
3.1

Post details (2025 to today)

Title Author Date Word count HN points
A guide to Bluetooth Low Energy hacking: Part II Andrew Pratt Jan 09, 2025 2907 -
Taking platform support for CVSS to the next level Abigail Nguy Jan 14, 2025 255 -
Shaping the future of cybersecurity: The Hacking Policy Council’s 2024 achievements and vision for 2025 Casey Ellis Jan 15, 2025 1148 -
Security flash: Salt Typhoon Erica Azad Jan 16, 2025 386 -
Bugcrowd’s Bugboss Fighter Challenge Santerra Holler Jan 21, 2025 286 -
MFA security part 1: How attackers bypass multi-factor authentication Alistair G, Director of Red Team Operations Jan 22, 2025 2100 -
Managing the cost implications of EU DORA compliance Julian Brownlow Davies Jan 23, 2025 1064 -
The new (de)regulated AI security space: A hacker’s perspective Guest Post Jan 27, 2025 1310 -
Hacking Crypto Part I Nerdwell Jan 30, 2025 4781 -
The EU Cyber Resilience Act (CRA), explained Gareth O Sullivan Feb 11, 2025 923 -
Continuous security testing for DORA compliance Julian Brownlow Davies Jan 29, 2025 989 -
The EU AI Act, explained Gareth O Sullivan Feb 06, 2025 890 -
MFA security part 2: How to prevent MFA bypass Alistair G, Director of Red Team Operations Feb 11, 2025 626 -
Point-in-time vs. continuous penetration testing: A comparison guide Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 03, 2025 891 -
Hacker spotlight: Meet Nerdwell Santerra Holler Feb 05, 2025 1531 -
Crowdsourced intelligence in action: Bugcrowd’s 2024 year in review Dave Gerry Feb 04, 2025 943 -
The ultimate beginner’s guide to Nuclei Andrew Pratt Feb 13, 2025 2550 -
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update Paddy Cassidy Feb 12, 2025 553 -
Bugcrowd security flash: CFAA and thought crime Erica Azad Feb 13, 2025 558 -
How to hack WiFi Andrew Pratt Feb 26, 2025 2831 -
Hacker Experience Surveys: Amplifying your voice at Bugcrowd Emma Feb 19, 2025 1415 -
A look inside global collegiate pen testing Bugcrowd Feb 21, 2025 1990 -
Hacking crypto part II: Hacking blockchains for fun and profit Nerdwell Feb 20, 2025 4070 -
The biggest security risks facing the maritime shipping industry Julian Brownlow Davies Feb 27, 2025 1191 -
Hacking LLM applications: A meticulous hacker’s two cents Guest Post Feb 27, 2025 3438 -
A hacker breaks down Netflix’s new show, Zero Day Guest Contributor Mar 06, 2025 1900 -
What you need to know about H.R. 872 Casey Ellis Mar 06, 2025 488 -
Hardware hacking with the University of New Brunswick Cybersec Club Bugcrowd Researcher Success Mar 04, 2025 705 -
Secure by Design: From pledge to practice Casey Ellis Mar 05, 2025 665 -
Best practices to avoid Bugcrowd platform violations Guest Post Mar 12, 2025 1112 -
The rise of device code phishing Alistair G, Director of Red Team Operations Mar 11, 2025 1407 -
Safe harbor and the future of AI flaw reporting: Lessons from vulnerability disclosure Casey Ellis Mar 13, 2025 1142 -
Announcing the new women-only hacking community: HackerHER Network Emma Mar 13, 2025 809 -
Red teaming vs. penetration testing: A guide to comprehensive security testing Justin Kestelyn, Bugcrowd Head of Product Marketing Mar 13, 2025 1656 -
Why AI will never replace the Crowd Julian Brownlow Davies Mar 19, 2025 899 -
Remote code execution (RCE) 101 Guest Post Mar 26, 2025 1092 -
A ​​low-cost hacking sidekick: Baby steps to using offensive AI agents Ads Dawson Mar 27, 2025 3235 -