skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

How Governments are Running Effective Bug Bounty Programs

If you’re reading this article, statistically speaking your organization might be getting hacked. In the private sector, the Equifax hack and Intel’s processor vulnerabilities took the mainstream media by storm. And over the past year, data breaches of U.S. government networks, once novel, have…

Read More

Hacker Spotlight: Nicole Anderson-Au

With the launch of the weekly Researcher Spotlight, we will share stories from our global hacker community. This week we’re putting the Spotlight on a Cal Poly student studying Computer Science, Nicole Anderson-Au. When Nicole was very young, she loved…

Read More

Hacker Spotlight: Mikhail Egorov

With the launch of the weekly Researcher Spotlight, we will share stories from our global hacker community. This week we’re putting the Spotlight on Mikhail Egorov, also goes by 0ang3el. Feel free to follow Mikhail Egorov on Twitter @0ang3el Mikhail…

Read More

[Guest Post] Trinity Public Bug Bounty

This blog originally appeared on IOTA Foundation's blog and is written by Lewis Freiberg, Director of Ecosystem at IOTA. The Trinity wallet bug bounty program is now open to the public. Since its release, Trinity Wallet has been warmly welcomed by the…

Read More
Back To Top