![](https://www.bugcrowd.com/wp-content/uploads/2022/05/171120Blog20-20Uber20breach20-20Twitter-1.png)
The Uber Breach: Extortion Does Not Equal Bug Bounty
By David Baker, November 27, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/V.220of20New20Tailored20Approach20to20Submission20Search.png)
Bugcrowd Introduces a New, Intuitive Submission Search Bar
By Bugcrowd Product Marketing, November 21, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/171120ITMOAH20Blog20220_20David20Baker2028129-1.png)
How Understanding Researcher Motivations Can Help You Run a Successful Bug Bounty Program
By David Baker, November 21, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/d20-how-i-roll-1024x676-1.jpeg)
How to Earn Your Way Onto a Private Bounty Program
By Bugcrowd, November 10, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/IDOR20Researcher20Blog20post20Nov202017-1.png)
How-To: Find IDOR (Insecure Direct Object Reference) Vulnerabilities for Large Bounty Rewards
By Bugcrowd Researcher Success, November 9, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/Car20Hacking20in20the20Cloud2028for20Cheap2920at20DEF20CON2028129-1.png)
Car Hacking in the Cloud (for Cheap) at DEF CON, Part 2
By Bugcrowd Researcher Success, October 30, 2017
![](https://www.bugcrowd.com/wp-content/uploads/2022/05/Qualys2020Bugcrowd20announcement.png)
Bugcrowd Integration Now Available in Qualys Web Application Scanning
By Bugcrowd, October 18, 2017
Subscribe for updates
Get Started with Bugcrowd
Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.