
Research and an idea spun up at 8PM in a small room with two friends led to the discovery of an internet wide vulnerability on more than 25 bug bounty programs. This talk will cover how we approached the situation, how we planned and managed our tests, and the reporting processes, from writing the report to having a good PoC.
Get Started with Bugcrowd
Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.