skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

Researcher Spotlight: Sebastian Neef, Tim Schäfers of Internetwache

This week’s Researcher Spotlight is actually on two researchers which make up a team. Internetwache is one of the most active groups in the bug bounty researcher scene, finding vulnerabilities in Facebook, eBay, Apple, Twilio and many others. The team consists of Sebastian Neef and Tim Schäfers, and they were both kind of enough to participate in this week’s spotlight interview.

Read More

Researcher Spotlight: Mazin Ahmed

Today’s spotlight is on a researcher who clearly enjoys giving back and helping the community. Mazin Ahmed has been active in the bug bounty scene for the last two years and can often be found collaborating and joining discussions on Twitter, IRC, forums and other communities.

Read More

Researcher Spotlight – Casey Dunham

The security researcher community at Bugcrowd is quite diverse with backgrounds and experience of all shapes and sizes. This week’s researcher spotlight is on Casey Dunham, a security professional with a computer science background and experience as a software developer. In our interview below, you will see how Casey’s background informs his approach to security testing and enables his success.

Read More

Art Coviello Joins Our Board of Directors

We are excited to announce the newest member of the Bugcrowd Board of Directors, industry icon and veteran driver of cybersecurity innovation, Art Coviello Jr.

Bugcrowd’s view has always been that the economic and resourcing model of the bug bounty programs pioneered by Netscape, Google and Facebook is more that just the “latest and greatest tech-company fad.” It’s a necessary and inevitable evolution in security assessment, and it’s benefits will impact the entire IT ecosystem.

Read More

3 Years, 20,000 Security Researchers, and Nearly 200 Clients Later…

2012 was the year that almost every industry, banking, education, government, big tech and even security, was hacked. Many, if not all of these companies were doing “all” they could to protect themselves against these hacks, and yet they were still left vulnerable. In direct response to this, 2012 was also the year we built Bugcrowd to beat an army of adversaries with an army of allies.

Read More

Vulnerability Prioritization at Bugcrowd

The only way for a security team to effectively manage risk is vulnerability prioritization and management. There are many different prioritization models used across the industry that are based on vulnerability risk and impact. Without a clear prioritization model, how do you know what to fix first? Highest CVSS Score? FIFO? LIFO? Externally known issues? Whatever your prioritization plan is, it needs to be documented and updated as threats to your business change.

Read More
Back To Top