skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

Topic: Thought Leadership

Fight the Fear of Shadow and Zombie APIs

One of Gartner’s 2022 security predictions is focused on the adoption and growth of APIs, which will require improvements in management and security. There were some interesting planning assumptions in this research note about the challenges organizations will increasingly face in…

Read More

Todayisnew and Hx01 on Collaboration

Todayisnew And Hx01 On Collaboration

Unless you’ve been living under a rock, Bugcrowd expanded our Collaboration feature this year. To complement this extraordinarily convenient feature we also announced our first-ever #TeamHunt2021 challenge! 15 teams, 5 weeks, one grand prize!  Before the competition, we caught up…

Read More

Bugcrowd Platform Behavior Standards

To Invoke Humanizing Compassion To Our Readers As They Understand Our New Behaviour Standards

REMEMBER THE HUMAN Over the years we’ve earned the trust of security researchers and customers through our tireless commitment to values as simple as respect, honesty, accountability, and embracing the hacker mindset. These straightforward company standards define not only our…

Read More

The Trouble with Traditional Penetration Testing

When it comes to pen testing, organizations require access to the skills they need when they need them. Large consultancy groups often leverage a “one-size-fits-all” approach to pen testing. Although the resumes these groups highlight may seem impressive, it’s rare…

Read More

PrintNightmare: What You Need to Know

PrintNightmare or PrinterNightmare is an interesting vulnerability currently impacting Microsoft systems. This vulnerability can be executed on remotely accessible systems and has a lot of potential for abuse by ransomware operators.  Here are the basics: PrinterNightmare - CVE-2021-34527 CVE ID:…

Read More

The Kaseya/REvil Attack Explained

Why it Matters and How to Protect Yourself What Happened? At around 1400 EDT on July 2, attackers appear to have used a 0-day authentication bypass vulnerability in Internet-exposed instances of the Kaseya Virtual System Administrator (VSA) server software, a…

Read More
Back To Top