Harinder SinghJun 28, 20243 min readCodebreakers Chronicles: Ethical Hacking Journey with Harinder Singh
Abhinav BangiaJun 27, 20243 min readBeyond the Firewall: Enhancing Security Through External Research and Bug Bounties
Abhinav BangiaJun 11, 20243 min readThe Impact of ISO 27001:2022 Certification on Bug Bounty Platforms
Anurag TripathiMay 14, 20242 min readShielding Your WordPress Site:Understanding and Mitigating XML-RPC Vulnerabilities
Abhinav BangiaMay 10, 20243 min readEmbracing Bugs as Milestones: The Critical Role of Incident Response Teams in Bug Bounty Programs
Abhinav BangiaMay 2, 20243 min readWhy Bug Bounty Programs Are Not a Risk: Dispelling Common Misconceptions
Abhinav BangiaApr 18, 20243 min readConstant Vigilance: Embracing Continuous Security Testing in a Dynamic Threat Landscape
Abhinav BangiaApr 9, 20243 min readTop 10 Strategic Questions CISOs Must Consider Before Launching a Bug Bounty Program
Abhinav BangiaMar 5, 20242 min readGuarding Against Price Manipulation: Top 5 Vulnerabilities in E-Commerce Websites
Abhinav BangiaFeb 16, 20242 min readHow do we make sure vulnerability isn't disclosed publicly or ethical hacker doesn't go roque?
Abhinav BangiaFeb 13, 20242 min readNavigating the Cyber Storm: Top 10 Cybersecurity Incidents of January 2024
Abhinav BangiaDec 27, 20232 min readMastering Network Scanning with Nmap: Discovery in Bug Bounty Hunting
Abhinav BangiaDec 20, 20233 min readCybersecurity in Healthcare: Protecting Patient Data in an Era of Constant Threats
Abhinav BangiaSep 22, 20233 min readDeciphering Bug Severity in Bug Bounty Programs: A Deep Dive into Impact Assessment