Jan. 2014 |
Bugcrowd Tagged Case Study Part 1 - Background |
TLEtPh4W-OU |
Feb. 2014 |
Bugcrowd Tagged Case Study Part 3 - Bugcrowd Researchers |
UWF764xDNqo |
Feb. 2014 |
Bugcrowd Tagged Case Study Part 2 - Working with Bugcrowd |
M9SbYCFmqBo |
Dec. 2014 |
Finding Bugs with Burp Plugins & Bug Bounty 101 |
Q2WK5LpDbxw |
Feb. 2015 |
How DevOps becomes DevOpsSec - Chris Raethke, Bugcrowd Webinar |
936lNE3EHg4 |
Mar. 2015 |
Key Takeaways from Instructure's Successful Bug Bounty Program |
FuhJ_E26ZZY |
Apr. 2015 |
Bugcrowd Researcher Interview: Fredrik "Almroot" Almroth |
9uxyHxTnh7A |
Apr. 2015 |
Bugcrowd Customer Testimonial: Card.com |
CT6KYqEing4 |
May. 2015 |
[Webinar] The Art & Value of Bug Bounties |
WhRmzxgtsXQ |
Jun. 2015 |
How the Crowd Outperforms Traditional Security Testing |
DK1tNYwQ6GA |
Jun. 2015 |
[Webinar] 5 Tips For a Successful Bug Bounty Program |
3UaO3avs_Hg |
Jul. 2015 |
Hacking with Burp Suite - Tutorial 1 |
N-IKHmGjf2c |
Jul. 2015 |
Build or Buy: Barracuda Bug Bounty Story |
Ntlhe-5lCd0 |
Jul. 2015 |
Mobile Application Security Threats through the Eyes of the Attacker |
Cna3276byrQ |
Aug. 2015 |
How To Shot Web - Jason Haddix's talk from DEFCON23 |
VtFuAH19Qz0 |
Aug. 2015 |
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs |
wqEM3ajdH-A |
Aug. 2015 |
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV |
efy2NJgfpQo |
Aug. 2015 |
Bugcrowd Summer 2015 Product Release |
1hdFfSUoqlI |
Aug. 2015 |
What You Missed During Black Hat and DEFCON |
xLgr7RHZ9lE |
Sep. 2015 |
Revitalizing Product Security at Zephyr Health |
GbW777t1tTA |
Jan. 2016 |
Paul Moreno on Pinterest's Security Culture and Bug Bounty Program |
SJxBIIEgy18 |
Mar. 2016 |
Bugcrowd and (ISC)2 Partner on CPE Credits for Bounty Participation |
0AGsWuSCUhk |
Mar. 2016 |
Why (ISC)2 Utilizes Crowdsourced Cybersecurity with Bugcrowd |
deA7w9yM4Bc |
Mar. 2016 |
Bugcrowd 1st Annual Buggy Awards 2016 |
TE2juv22hy4 |
Apr. 2016 |
Writing Vulnerability Reports that Maximize Your Bounty Payouts |
zyp2DoBqaO0 |
Apr. 2016 |
Meet Crowdcontrol, connecting your security team to white-hat hackers |
CDzjI3avLZs |
May. 2016 |
Why Western Union Utilizes a Crowd for Application Security Testing |
F2laMpUdycM |
Jul. 2016 |
Join Bugcrowd's security researcher community |
Uudt0EmD4jU |
Sep. 2016 |
Inside the Mind of a Hacker: Mathias Karlsson |
sQ2mtIUMEo8 |
Sep. 2016 |
Inside the Mind of a Hacker: Luke Young |
TO6ymWay_1Y |
Sep. 2016 |
Inside the Mind of a Hacker: Frans Rosén |
0mpqXLEA9NM |
Sep. 2016 |
Inside the Mind of a Hacker: Mathias Karlsson (Full Interview) |
yT5omaPizpg |
Sep. 2016 |
Inside the Mind of a Hacker: Luke Young (Full Interview) |
DN4RKJMk09I |
Sep. 2016 |
Inside the Mind of a Hacker: Frans Rosen (Full Interview) |
Dcw3bOcJMD8 |
Nov. 2016 |
Inside the Mind of a Hacker - Phwd |
rHHmvISw6e8 |
Nov. 2016 |
Okta Launches Public Bug Bounty Program with Bugcrowd |
xWwhOV1_qW8 |
Jan. 2017 |
Okta's Bug Bounty Program Improves Their Product Security Efficiency |
cN-THil99kU |
Feb. 2017 |
Bugcrowd's 2017 Winter Product Release - Integrative Workflow |
BncuwBtnJ8w |
Feb. 2017 |
Bugcrowd's 2017 Winter Product Release - Researcher Enablement |
gbPAZuPsVLw |
Feb. 2017 |
Bugcrowd's 2017 Winter Product Release - Insightful Reporting |
ILryahSCt_s |
Feb. 2017 |
Bugcrowd at RSAC2017: Dave Farrow on AppSec Challenges and Opportunities |
yytV2jjZ_KM |
Feb. 2017 |
Qualys and Bugcrowd Partnership: Automation and the Crowd |
OF15ii7jN0w |
Feb. 2017 |
OneLogin's Commitment to Data Security |
XR-bb4mrELM |
Mar. 2017 |
Bugcrowd's 2nd Annual Buggy Awards |
FT9NL3-zYlM |
Apr. 2017 |
Bugcrowd's Researcher Dashboard |
O2CyHOsDVf8 |
Apr. 2017 |
13 Year Old Hacker on Motivations and Plans for the Future |
avzGsaWgHZc |
Jun. 2017 |
Bugcrowd's 2017 Spring Product Release - Insights Dashboard |
C9KCsAk7MKg |
Jul. 2017 |
Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's LevelUp 2017 |
C4ZHAdI8o1w |
Jul. 2017 |
Welcome to LevelUp 2017! Intro from Sam Houston |
BR6QgzudquE |
Jul. 2017 |
Esoteric sub-domain enumeration techniques - Bharath, from Bugcrowd's LevelUp 2017 |
e_Gq99CKAys |
Jul. 2017 |
OWASP iGoat - Learning iOS App Penetration Testing & Defense - Swaroop Yermalkar, LevelUp 2017 |
VeW_G4xoh5Q |
Jul. 2017 |
Casey Ellis on the State of Bug Bounties & Ask Me Anything - LevelUp 2017 |
sOSoG3ysbH8 |
Jul. 2017 |
LevelUp 2017 - Stream 1 - full day stream, unedited |
IiMDDaZPx7k |
Jul. 2017 |
MarkDoom: How I Hacked Every Major IDE in 2 Weeks - Matt Austin, LevelUp 2017 |
nnEnwJbiO-A |
Jul. 2017 |
Hacking Internet of Things for Bug Bounties - Aditya Gupta, LevelUp 2017 |
AKoyZLibIeo |
Jul. 2017 |
Car Hacking 101 - Alan Mond, LevelUp 2017 |
P-mzo2X47sg |
Jul. 2017 |
How does unicode affect our security? - Christopher Bleckmann-Dreher, LevelUp 2017 |
VtbVkG3_NsE |
Jul. 2017 |
Browser Exploitation for Fun and Profit - Dhiraj Mishra, Bugcrowd's LevelUp 2017 |
j3SbkXxdvnE |
Jul. 2017 |
Targeting for Bug Bounty Research - Matthew Conway, Bugcrowd's LevelUp 2017 |
hYJ7ipSOplw |
Jul. 2017 |
Advanced Android Bug Bounty skills - Ben Actis, Bugcrowd's LevelUp 2017 |
OLgmPxTHLuY |
Jul. 2017 |
Do you like fuzzing? - Abhijeth, Bugcrowd's LevelUp 2017 |
uOfXud0iVf8 |
Jul. 2017 |
Hidden in Plain Site: Disclosing Information via Your APIs - Peter Yaworski, Bugcrowd's LevelUp 2017 |
jBi3a-dXsM8 |
Jul. 2017 |
Doing recon like a boss - Ben Sadeghipour, Bugcrowd's LevelUp 2017 |
1Kg0_53ZEq8 |
Jul. 2017 |
Reverse Engineering iOS Mobile Apps - Emily Walls, Bugcrowd's LevelUp 2017 |
ONTvixnUVPw |
Jul. 2017 |
Giving Back to the Bug Bounty Community - ZSeano, Bugcrowd's LevelUp 2017 |
BEaMhs9LmoY |
Jul. 2017 |
Breaking Mobile App Protection Mechanisms - Ben Actis, Bugcrowd's LevelUp 2017 |
jFBFh9QfmjM |
Jul. 2017 |
Finding Hidden Gems in Old Bug Bounty Programs - Yappare, Bugcrowd's LevelUp 2017 |
-FLzKJ3IAAQ |
Jul. 2017 |
How to Fail at Bug Bounty Hunting - Caleb Kinney, Bugcrowd's LevelUp 2017 |
XAjpilWbSSQ |
Jul. 2017 |
Identifying & Avoiding Android app Protections - Tim Strazzere, LevelUp 2017 |
MH1gQLDxx2w |
Sep. 2017 |
Learn Bugcrowd in 10 Minutes |
APsDD2V8N20 |
Nov. 2017 |
Crowdcontrol: Customer Submission Search Walk-Through |
qlwLpu1xaHQ |
Nov. 2017 |
Crowdcontrol: Researcher Submission Search Walk-Through |
RpB_XugcUyE |
Feb. 2018 |
Inside the Mind of a Hacker 2.0 - Interview with Matthew Layton |
Jfp1OPmddRI |
Feb. 2018 |
Benefits of a Fully Managed Public Bug Bounty - Atlassian Interview |
Q146YEhjlpA |
Feb. 2018 |
Inside the Mind of a Hacker 2.0 - Interview with Darkarnium |
G0TvT7swV8k |
Feb. 2018 |
Fitbit's Commitment to Consumer Privacy and Data Security |
BA-XTNCDKO4 |
Mar. 2018 |
Bugcrowd Intro |
Cj0h-YXKC_o |
Apr. 2018 |
2018 Buggy Awards |
043HhuKpDNE |
May. 2018 |
LevelUp 0x02 - Small Files And Big Bounties, Exploiting Sensitive Files |
pzH-gytUWWI |
May. 2018 |
LevelUp 0x02 - Hacking OAuth 2.0 For Fun And Profit |
X0mV9HXbKHY |
May. 2018 |
LevelUp 0x02 - Practical recon techniques for bug hunters & pen testers |
McLdm4c1oLs |
May. 2018 |
LevelUp 0x02 - Bug Bounty Hunter Methodology v3 |
Qw1nNPiH_Go |
May. 2018 |
LevelUp 0x02 - Trickle Down PwnOnomics |
Vp03EtR5-TY |
May. 2018 |
LevelUp 0x02 - Meet a Bugcrowd Program Admin, Twitch |
_xYyonJbpbY |
May. 2018 |
LevelUp 0x02 - Hardware Hacking 101 |
KJHM0gUoCAg |
May. 2018 |
LevelUp 0x02 - Back to Basics: Application Security Practices in Smart Contract Auditing |
7V9EEGNMicI |
May. 2018 |
LevelUp 0x02 Intro - Bugcrowd Ambassador Program announcement |
oKQYd2Pxn2Y |
May. 2018 |
Motorola Mobility Reduces Risk with Bugcrowd |
Rw2xY_9h5Qo |
Jun. 2018 |
Dash Digital Cash + Bugcrowd |
3SrYgBIFHlM |
Jun. 2018 |
Memo Trader + Bugcrowd |
fniCf8-Rl3s |
Jul. 2018 |
Bromium Identifies Security Flaws with Bugcrowd |
mt8PNEZRcgQ |
Aug. 2018 |
What are you most excited about for Black Hat and DEF CON 2018 |
1URlfffiJyc |
Aug. 2018 |
Bugcrowd University - Introduction to Burp Suite |
h2duGBZLEek |
Aug. 2018 |
Bugcrowd University - Cross Site Scripting (XSS) |
gkMl1suyj3M |
Aug. 2018 |
Bugcrowd University - Introduction + Become a Bug Bounty Hunter |
EZzAl-bfu7Q |
Aug. 2018 |
Bugcrowd University - How to Make a Good Bug Submission |
OVr7pnwJ2m8 |
Aug. 2018 |
Bugcrowd University - Broken Access Control Testing |
94-tlOCApOc |
Aug. 2018 |
Bridging the Gap Between Developers and Security Teams |
Kigh9jZL23o |
Aug. 2018 |
Meet the ASE Panel 2018 |
0Sil0nq5LDM |
Oct. 2018 |
HP launches IoT Bug Bounty Program with Bugcrowd |
Y9iVSagSLJU |
Nov. 2018 |
Welcome to Bugcrowd | The #1 Crowdsourced Cybersecurity Platform |
1q2embY1KPE |
Nov. 2018 |
Happy Thanksgiving from Bugcrowd |
XvUGACGvrfw |
Nov. 2018 |
Bugcrowd Bug Bash with Arlo at Camp SLO |
Efc-E6JuJ_o |
Dec. 2018 |
Bugcrowd Saves InVision 80% of Required Time to Remediation |
qxElZLFBTA8 |
Dec. 2018 |
Why Bug Bash? |
pWqDcYmq1yo |
Dec. 2018 |
Bugcrowd Bug Bash Sydney |
ID7sVvRKKwk |
Dec. 2018 |
Bugcrowd’s Jira integration helps bolster DevSecOps at Outreach.io |
juRnuw61U_w |
Dec. 2018 |
Inside the Mind of a Hacker: Interview with @Hateshape |
C0jXyfD6PIo |
Dec. 2018 |
Bugcrowd Researcher Inti De Ceukelaire AKA intidc |
XfMVq6AC8uM |
Dec. 2018 |
Bugcrowd Researcher Michael Gianarakis |
r9PmcUdhY4k |
Dec. 2018 |
Bugcrowd Researcher Shubham Shah AKA infosec_au |
CD_M8yPfaLw |
Dec. 2018 |
Bugcrowd Researcher Miguel Regala AKA fisher |
2hrV-lcqNRU |
Dec. 2018 |
Inside the Mind of a Hacker: Interview with @PhillipWylie |
Ia6I6a8bCsY |
Dec. 2018 |
Jason Haddix, VP of Researcher Growth at Bugcrowd |
E_eLmDdaAIg |
Dec. 2018 |
Inside the Mind of a Hacker: Interview with @JR0ch17 |
SKwp4hITYH4 |
Dec. 2018 |
Bugcrowd Researcher José Sousa AKA JLLiS |
o7F9QgeUr5s |
Jan. 2019 |
Founder & CTO of Kenna Security Talks about the Benefits of Bugcrowd |
9c2QhmTokyY |
Jan. 2019 |
Finding Bugs with Binary Ninja by Jordan Wiens |
55gClG-sjWc |
Jan. 2019 |
Social Engineering 101 by Matteo Cagnazzo |
NpMmd6ODkfc |
Jan. 2019 |
AEM hacker - approaching Adobe Experience Manager webapps by Mikhail Egorov |
EQNBQCQMouk |
Jan. 2019 |
Profiling the Attacker - Using Offender Profiling In SOC Environments by James Stevenson |
SQM6c6wlwL4 |
Jan. 2019 |
Serverless Top 10 Vulnerabilities by Tal Melamed |
C61PJKumlcQ |
Jan. 2019 |
Why humans suck at calculating risk and how it affects security - Masha Sedova |
RBoI0sSBeDo |
Jan. 2019 |
IoT - Attacker Point of View by Arnaud COURTY |
xK7uSdlxgf4 |
Jan. 2019 |
From an IVI in a box to a CAR in a box by Ian Tabor 'mintynet' |
qO795qZO87w |
Jan. 2019 |
What you reap, is what you sow by Chris Sidragon1 Roberts |
hPSkbHjMzsI |
Jan. 2019 |
Behind the Curtain: Safe Harbor and Department of Defense |
-hgGyL58wZc |
Jan. 2019 |
From CTF to CVE by Joe Gray |
1N2Y4c1JqAc |
Jan. 2019 |
What's in my hacking tool box? by Richard Rushing |
P1LV2yYuijw |
Jan. 2019 |
Bad API, hAPI Hackers! by jr0ch17 |
UT7-ZVawdzA |
Jan. 2019 |
API Security 101 by Sadako |
ijalD2NkRFg |
Jan. 2019 |
Mach0 and the App Store by Murtaza Munaim |
-nPXpfiqmiw |
Jan. 2019 |
The Law and You: Reducing the Cost of Free Speech by Nate Cardozo from EFF |
Qx_xPDfWbUg |
Jan. 2019 |
iPhone Baseband Research + Reversing by Sem Voigtländer |
Mwh1PsfEerw |
Jan. 2019 |
Turbo Intruder: Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle |
vCpIAsxESFY |
Jan. 2019 |
Intro to Bugcrowd |
wpAJ1xDxC5E |
Feb. 2019 |
TaxSlayer keeps tax payers data safe with Bugcrowd |
0hEkkK4FspY |
Apr. 2019 |
2019 Buggy Awards Ambassador of the Year - Phillip Wylie |
gLrOPpazkHE |
Apr. 2019 |
2019 Buggy Awards - Best Communications Award FCA |
ulyAIwuUqB4 |
Apr. 2019 |
2019 Buggy Awards - Program of the Year - Atlassian |
ZNkn-K8zvv8 |
May. 2019 |
Test stream before lvlup 4 |
FwGXD77b-zA |
Jun. 2019 |
LevelUp 0x04 - Day 1 |
0JThM1dcdKU |
Jun. 2019 |
LevelUp 0x04 - Day 2 |
BOyuLNO3QLs |
Jun. 2019 |
LevelUp 0x04 - Car Hacking: A College Student’s Perspective |
56LB7pTyax4 |
Jun. 2019 |
LevelUp 0x04 - Forget ME, Remember WE. How to hack better with a group |
FhHmGQzHtso |
Jun. 2019 |
LevelUp 0x04 - So You Want to Be a Pentester? |
cKNNKoSAHkI |
Jun. 2019 |
LevelUp 0x04 - Fun with Frida on Mobile |
dqA38-1UMxI |
Jun. 2019 |
LevelUp 0x04 - 1 Hacker is Good, 2 Hackers are Better – Bug Hunting as a Team |
BURrSvYhqHY |
Jun. 2019 |
LevelUp 0x04 - How to Use Zap + using Zap HUD in your browser |
7WL-emt5PDc |
Jun. 2019 |
LevelUp 0x04 - Group Hacking: a mini live-hacking event |
QyrmCA9Hyb4 |
Jun. 2019 |
LevelUp 0x04 - The Diary of an (Inexperienced) Bug Hunter - Intro to Android Hacking |
LIVIzJEdE9w |
Jun. 2019 |
LevelUp 0x04 - OWASP Amass – Discovering Internet Exposure |
C-GabM2db9A |
Jun. 2019 |
LevelUp 0x04 - Welcome Address by Ashish Gupta, Bugcrowd CEO |
ID2A34_AvSM |
Jun. 2019 |
Bugcrowd Researcher Eric AKA Todayisnew |
Y2vuMirw5Fk |
Jun. 2019 |
Pride 2019 at Bugcrowd |
KjfMOyDEOAU |
Jul. 2019 |
Bugcrowd Next Gen Pen Test |
z-yJA-R-DJc |
Jul. 2019 |
Bugcrowd Researcher Frans Rosen on Bug Bashes |
9LgiM_877d0 |
Jul. 2019 |
Bugcrowd Researcher Frans Rosen on collaboration |
4-BVT60eN3U |
Jul. 2019 |
Bugcrowd researcher Frans Rosen |
mH5n7QeDSSc |
Aug. 2019 |
GitHub Recon and Sensitive Data Exposure |
l0YsEk_59fQ |
Aug. 2019 |
Bugcrowd University - Advanced Burp Suite |
kbi2KaAzTLg |
Aug. 2019 |
Recon & Discovery |
La3iWKRX-tE |
Aug. 2019 |
XML External Entity Injection |
9ZokuRHo-eY |
Aug. 2019 |
Server Side Request Forgery |
4kLcblAuQlw |
Oct. 2019 |
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure - LevelUp 0x05 |
NPDp7GHmMa0 |
Oct. 2019 |
GSuite Security: Everyone wants it but not everyone gets it - LevelUp 0x05 |
qdelpOxTXO4 |
Oct. 2019 |
Overview of common Android app vulnerabilities - LevelUp 0x05 |
51S8PeuzlmI |
Oct. 2019 |
Hardware Hacking for the Masses (and you!) - LevelUp 0x05 |
95vRsoGG9dc |
Oct. 2019 |
Bugcrowd Attack Surface Management |
6mRZJNnnoDs |
Feb. 2020 |
AMA Next Gen Pen Test |
i_rkxEKreI4 |
Feb. 2020 |
5 Tips and Tricks for Running a Successful Bug Bounty Program |
HagyzkafZJU |
Feb. 2020 |
Crowdsourced Security Inside Look: Founder AMA |
5vCiygSjJfc |
Feb. 2020 |
Demystifying Program Management in Crowdsourced Security |
3kVxfuvtWa0 |
Feb. 2020 |
Using Bugcrowd and Jira to Streamline Application Security |
l70T1VuIRsw |
Feb. 2020 |
5 Keys To Understanding Vulnerability Disclosure |
nALklVTh24Q |
Feb. 2020 |
Lessons Learned: How Equifax Changes The Way We Think About Cybersecurity |
omY-iipxTX4 |
Feb. 2020 |
5 Critical Security Issues for 2017 (And How to Address Them) |
GQs1UkbMpe0 |
Apr. 2020 |
Cybersecurity in Education with Softdocs |
5GV-3_fdIT4 |
Apr. 2020 |
Bugcrowd takes on the #roxannechallenge! |
e4ybxHEtiFo |
Apr. 2020 |
Bugcrowd takes on the #roxannechallenge |
ssLR_977bvE |
May. 2020 |
Introduction to Bugcrowd |
b-Z_sp18Isg |
May. 2020 |
Why I ❤️ Offensive Work and Why I 💔 Offensive Work - w/Thomas Dullien (@halvarflake) |
L6KCsArKkAc |
May. 2020 |
Business Tradecraft for Hackers in the Corporate Industrial Complex - Josh Schwartz (@fuzzynop) |
ixWO0e51p-o |
May. 2020 |
Code that gets you pwn(s|'d) - Louis Nyffenegger (@snyff) |
BNHKlj-PMDc |
May. 2020 |
Car Hacking Explained for Bug Hunters v2.0 - w/Jay Turla (@shipcod3) |
kNtxH3zjWbE |
May. 2020 |
Sticking With It: How To Choose a Target & Stay Motivated - w/Katie Paxton-Fear (@InsiderPhD) |
R1YrUrHy1jQ |
May. 2020 |
Hackers Don’t Wear Black Hoodies, They Wear Capes - w/Chloé Messdaghi (@ChloeMessdaghi) |
YP_E2e0elpI |
May. 2020 |
Hacking Your Resumé - w/Ricki Burke (@cybersecricki) |
JvufpqwV45A |
May. 2020 |
Recognition Primed Bug Bounty Hunting - w/Rhys Elsmore (@rhyselsmore) |
W3mbeVA2Ugk |
Jul. 2020 |
Bug Bounty by Bugcrowd |
6QTe6vRofu8 |
Jul. 2020 |
F5 TMUI RCE Vulnerability Burndown w/@sml555_ and @caseyjohnellis |
znNCKKI4R4g |
Aug. 2020 |
CodeQL Roundtable stream w/@JLLeitschuh |
4lvUd3xYL4w |
Aug. 2020 |
Bugcrowd Security Flash |
3iILBLKuSsk |
Aug. 2020 |
Introduction to AI & Machine Learning - w/InsiderPhD |
KPqx0t1uup8 |
Aug. 2020 |
Insecurity Through Obscurity - w/Nerdwell |
frF8mvrWu7o |
Aug. 2020 |
How to do Chrome Extension code reviews - w/BreanneBoland |
hmNNPUicpuY |
Aug. 2020 |
Hardware Hacking for the Masses (and you) v2 - w/BusesCanFly |
3YwrZQVfvm4 |
Aug. 2020 |
How to Crush Bug Bounties in the first 12 Months |
AbebbJ3cRLI |
Sep. 2020 |
It's Not a Vulnerability, It's a Feature - W/Bryson and Jorge |
TF1Bq6_OU9k |
Sep. 2020 |
Women In Security and Privacy Roundtable - LevelUp0x07 and WISP |
GFxdZwCXzbU |
Oct. 2020 |
These Are the Bugs You Should Look for in Late 2020 - w/@hakluke |
Af9IiIpTIEM |
Sep. 2021 |
OMIGOD Vulnerability |
zsgsFeDkBCA |
Oct. 2021 |
Cybersecurity Awareness Month with Casey Ellis, CTO, Bugcrowd and Beau Woods, Senior Advisor, CISA |
rPolvqyMMP4 |
Oct. 2021 |
Bugcrowd Security Flash - Apache CVE 2021-41773 |
x0Bk7nqeB4k |
Dec. 2021 |
Log4Shell, The Worst Java Vulnerability in Years |
m_AkCbFc8DM |
Dec. 2021 |
Thanks — Bugcrowd Holiday Video 2021 |
G_V_id9YICI |
Dec. 2021 |
Bugcrowd Security Flash - Log4Shell |
-lToSufJdtk |
May. 2022 |
LevelUpX - Series 1: Salesforce Object Recon with B3nac |
w7_qriRoKto |
Jun. 2022 |
LevelUpX - Series 3: How I hacked 55 Banks & Cryptocurrency Exchanges with Alissa Knight |
6yB33FihwtE |
Jul. 2022 |
The Bugcrowd Platform’s PTaaS Experience |
wIyD4htwfmk |
Jul. 2022 |
Hunting IDOR with Z-winK (Part 2) |
B_WESrC-wWs |
Sep. 2022 |
LevelUpX - Series 9: 8 Ways to (Almost) Never Get a Dupe Again with InsiderPhD (Katie Paxton-Fear) |
Ae0s4ow7nWc |
Nov. 2022 |
An Illuminating Interview with Bugcrowd Founder and CTO, Casey Ellis |
2D9bYz-DyiA |
Dec. 2022 |
2022 Vegas Bug Bash with Bugcrowd |
IeWCkJUIM40 |
Dec. 2022 |
LevelUpX - Series 12: Finding Sensitive Data in Android Apps with Nerdwell |
D_-mHBkfThI |
Jan. 2023 |
Bugcrowd Security Flash - Spring4Shell: What It Is and How To Address It |
Jn3RqptCxBI |
Jan. 2023 |
Bugcrowd Security Flash - Confluence Server Webwork OGNL Injection (CVE 2021-26084) |
wNskRrCnnp8 |
Jan. 2023 |
Bugcrowd Security Flash - Microsoft TCP/IP Vulnerability: What You Need To Know |
l447oGY1OJ8 |
Jan. 2023 |
Bugcrowd Security Flash - The Kaseya REvil Attack Explained |
LRReNL0FxW0 |
Jan. 2023 |
LevelUpX - Series 13: SPI Flash for Bug Bounty Hunters with Nerdwell |
DxiE35FZds4 |
Jan. 2023 |
LevelUpX - Series 14: Finding and Exploiting Hidden Functionality in Windows DLLs with Nerdwell |
xyqMBvTrbIA |
Mar. 2023 |
What is bug bounty? |
XSYzbAKgyUs |
Mar. 2023 |
How does the internet work? |
tr5xbhmSgO4 |
Apr. 2023 |
Your Guide to Burp |
ltgfOgN1GIo |
Apr. 2023 |
What is Access Control and How Can You Break It? |
ub5yaztmmK4 |
May. 2023 |
Cross-site Scripting |
vZoRn_j5jBM |
May. 2023 |
Information Disclosure |
ZM08KoiBkkI |
Jun. 2023 |
Bug Bounty Resources |
s4Zr4O1YjE4 |
Jun. 2023 |
Webinar with Bugcrowd and Nerdwell |
kQkBCaEqujk |
Jun. 2023 |
MOVEit Vulnerability | 15-Minute Security Flash |
8woyeG3Ac-A |
Sep. 2023 |
4 Essentials to Look for in a Crowdsourced Security Platform with Rapyd |
8lq_n0Z2i4c |
Oct. 2023 |
Unsolved Cyber Mysteries with Casey Ellis • Volume 1 |
TUsS1XcCzVA |
Oct. 2023 |
Unsolved Cyber Mysteries, Episode 1: The Max Headroom Signal Hijacking 📺 |
uJ-65FWITKk |
Oct. 2023 |
Cyberattacks on MGM and Caesars • Bugcrowd Security Flash |
6qqPxb_e4W8 |
Oct. 2023 |
Our #CEO, Dave Gerry, chats with Chris Cubbage @MySecurityAustralia on #Bugcrowd’s growth! 📈 |
VEr1s2bfNN4 |
Oct. 2023 |
ITMOAH 2023 • Bugcrowd Webinar |
sSLEQAuZW7g |
Oct. 2023 |
Unsolved Cyber Mysteries with Casey Ellis • Volume 2 |
HCClqdJWkbY |
Oct. 2023 |
Ask A Hacker Anything with Erik de Jong |
bcUEjZe4QEc |
Nov. 2023 |
Bug Bash 2023 | Las Vegas, NV |
QjX2GAW4LUo |
Nov. 2023 |
Choosing a Target |
9cbYUhdnFeI |
Nov. 2023 |
Unsolved Cyber Mysteries with Casey Ellis • Volume 3 |
XwTa1nDHz_8 |
Dec. 2023 |
Main App Methdology |
Ot8FihzhAjo |
Dec. 2023 |
WEB APIs |
wKTlcO-AxBM |
Dec. 2023 |
Bugcrowd CISA Webinar |
ll-3nrJovk8 |
Dec. 2023 |
Large Scope Target |
5Q2_EzGaCXU |
Jan. 2024 |
AI Safety and Compliance: Securing the New AI Attack Surface |
s5i0NOLOxE0 |
Feb. 2024 |
Security Flash: CISA Order to Disconnect Ivanti Products |
IIapUlmBJrk |
Mar. 2024 |
Hacker Note Taking |
S2cOvB3DUr8 |
Mar. 2024 |
When to Report a Bug |
qlzbzfNAXXE |
Apr. 2024 |
Bugcrowd Live Hacking event: Bug Bash Seattle 2024 with T-Mobile |
ZbQ5t7gzIw4 |
Apr. 2024 |
Game Hacking 101: an Introduction to Pwn Adventure 3 |
ernurguiIzg |
Jun. 2024 |
What's it like hacking with Bugcrowd? |
cDd2gAEtbTw |
Jun. 2024 |
How a Hacker Uses the Bugcrowd Platform with Brandon Reynolds |
Lplbqsm49Qs |
Sep. 2024 |
New methods of recon with OrwaGodfather |
5RyODeBjar4 |
Sep. 2024 |
How to Build a Secure Recon Network Using Tailscale |
sYnuPxNoY68 |
Oct. 2024 |
Unleash Ingenuity with Bugcrowd |
SB3aOCCk5AM |
Oct. 2024 |
Report Writing Explained: with Katie Paxton-Fear and Codingo |
vN-t9FWdcsA |
Oct. 2024 |
Bugcrowd's VRT: with Katie Paxton-Fear and Codingo |
LAyG8dySuMw |
Oct. 2024 |
Hacking AI: Bias in AI |
b7EULU_X7fQ |
Nov. 2024 |
Bugcrowd Live Hacking Event in Vegas |
ZCXV_bK2VO8 |
Nov. 2024 |
Game Hacking 102: Pwn Adventure 3 |
-C8DCUG5pac |
Nov. 2024 |
Hacker Showdown 2024: Carnival of ChAIos |
vtf5-2XhnD0 |