Maneesha DudekulaDec 26, 20243 min readCodebreakers Chronicles: Ethical Hacking Journey with Maneesha Dudekula
Akansha BishtDec 24, 20243 min readMaximising Security: Monthly Vulnerability Discovery with Com Olho
Aditya KumarDec 23, 20246 min readWhy Proving Impact is Crucial in Bug Bounty Reports: A Key to Effective Vulnerability Management
Akansha BishtDec 17, 20243 min readShielding the Wheels: Com Olho's Approach to Securing Automotive Operations
Akhilesh KumarDec 16, 20242 min readCodebreakers Chronicles: Ethical Hacking Journey with Akhilesh Kumar
Akansha BishtDec 12, 20243 min readHow to Build Trust with Researchers While Safeguarding Sensitive Data
Ganesh BagariaDec 9, 20242 min readCodebreakers Chronicles: Ethical Hacking Journey with Ganesh Bagaria
Akansha BishtNov 28, 20243 min readCom Olho: Redefining Cybersecurity with Innovation and Unmatched Support
Akansha BishtNov 19, 20243 min readUnlocking Bug Bounty Success: Are Indian CISOs and Their Teams Ready?
Chitranjan SinghNov 18, 20242 min readCodebreakers Chronicles: Ethical Hacking Journey with Chitranjan Singh
Abhinav BangiaNov 12, 20243 min readUnderstanding CVE-2024-6387: A P1 Vulnerability Exposing Systems to Remote Code Execution Risks
Dipti BhadouriyaNov 11, 20242 min readHow to Detect Device Tampering in APK Files and Keep Your App Safe
Aditya KumarOct 21, 20243 min readHow to Become a Bug Bounty Hunter in 2024: New Methods and Strategies
Akansha BishtOct 11, 20243 min readSecuring the Future: The Essential Role of Bug Bounty Programs in Fintech