Alex Brumen aka Brumens, .
Ver Fuente Visitas: 4799
Security professionals lack effective solutions to bridge the gap between modern IT and security. Bug Bounty was born to fill this ....
Ver Fuente Visitas: 4459
Bug Bounty hunters often alternate between feast and famine when it comes to unearthing vulnerabilities, says Italian hacker Leo ....
Ver Fuente Visitas: 855
A Swedish betting powerhouse that specialises in horse racing has enjoyed a rapid return on investment from running a Bug ....
Ver Fuente Visitas: 535
Our 12th hunter interviewee suspected that secure development practices might reduce hacking opportunities over time. However ....
Ver Fuente Visitas: 1156
Learn about L'Oréal's four-year Bug Bounty journey with .
Ver Fuente Visitas: 351
Like a scientist testing various hypotheses, an ethical hacker typically succeeds only after a lot of trial and error. Recognising this ....
Ver Fuente Visitas: 4332
Passion, persistence and curiosity are as important to success in Bug Bounty as technical hacking skills, according to one of ....
Ver Fuente Visitas: 1133
In the second episode of our series of interviews with white hat hackers from the .
Ver Fuente Visitas: 1150
Esdras Dago and William Le Berre – AKA 'Chackal' and 'Serizao' – talk about their experiences probing digital assets for ....
Ver Fuente Visitas: 1081
Persistent, creative, curious” – that's how the inaugural interviewee for our series of Bug Bounty hunter interviews describes ....
Ver Fuente Visitas: 1848
In this episode of SecureNinjaTV, we're at Tech Week Singapore 2024 exploring the world of bug bounty programs with Marcelin ....
Ver Fuente Visitas: 147
Watch highlights from Italy's first-ever live bug bounty event, featuring targets from Ferrero, the Italian sweet-packaged food giant..
Ver Fuente Visitas: 1717
Collaboration, curiosity and choosing targets where you already have extra privileges: discover the recipe behind Nagli's success ....
Ver Fuente Visitas: 1890
Guillaume Kermarrec, who oversees L'Oréal's Bug Bounty Program and threat/vulnerability management generally for the iconic ....
Ver Fuente Visitas: 252