bugcrowd (@bugcrowd) 's Twitter Profile
bugcrowd

@bugcrowd

The leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™

ID: 795470076

linkhttps://linktr.ee/bugcrowd calendar_today01-09-2012 06:29:55

24,24K Tweet

179,179K Takipçi

6,6K Takip Edilen

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Bolt now has a public bug bounty program on Bugcrowd! Hackers, this is your shot to secure one of Europe’s biggest mobility platforms. Start hacking 👉 bugcrowd.com/engagements/bo…

Bolt now has a public bug bounty program on Bugcrowd!

Hackers, this is your shot to secure one of Europe’s biggest mobility platforms.

Start hacking 👉 bugcrowd.com/engagements/bo…
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Outdated tools and limited access hinder mobile app research. In this blog, alx (alxhh) unpacks iOS security testing by walking through tools, techniques, and platform constraints, including: 🪲 Why a jailbroken device is essential 🐞 Key tools like Frida, AppSync, and

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Stop treating pentesting like a dentist appointment 🦷 Once or twice a year isn’t enough. A lot can go wrong between quarterly tests. Find out which approach fits your team best: bugcrowd.com/blog/point-in-…

bugcrowd (@bugcrowd) 's Twitter Profile Photo

New target alert 🚧 CoinDesk Data just made their API program public on Bugcrowd! 🧪 Go test it: bugcrowd.com/engagements/CC…

New target alert 🚧

CoinDesk Data just made their API program public on Bugcrowd! 

🧪 Go test it: bugcrowd.com/engagements/CC…
bugcrowd (@bugcrowd) 's Twitter Profile Photo

If you’re looking to jailbreak iOS devices for security research, you should check out checkra1n! Jailbreak for iPhone 5s through iPhone X, iOS 12.0 and up!  Download now 👉 checkra.in

If you’re looking to jailbreak iOS devices for security research, you should check out checkra1n!

Jailbreak for iPhone 5s through iPhone X, iOS 12.0 and up! 

Download now 👉 checkra.in
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Google just quietly cut trust from two CAs. ☁️Trey: “If you can’t trust these systems, you can’t trust the Internet. When trust breaks, action has to be taken.” This impacts how everyone online navigates trust. Find out why this fundamental change in browser security

bugcrowd (@bugcrowd) 's Twitter Profile Photo

If working with hackers feels risky, just wait until you see what happens when you don’t. Kidding! Please don’t wait 🙏 Join Beau Woods and Justin Beachler as they explore what motivates ethical hackers, how they work, and how trust plays a key role in making crowdsourced

If working with hackers feels risky, just wait until you see what happens when you don’t.

Kidding! Please don’t wait 🙏

Join Beau Woods and Justin Beachler as they explore what motivates ethical hackers, how they work, and how trust plays a key role in making crowdsourced
bugcrowd (@bugcrowd) 's Twitter Profile Photo

AI security can get messy… but that’s part of the fun. In this blog, Ads Dawson explains how to build an LLM agent from scratch using Rigging, and use it to hack your way through Crucible’s AI CTF. 📚 You’ll learn about: 👉 Prompt injection 👉 Model inversion 👉 Fingerprinting

bugcrowd (@bugcrowd) 's Twitter Profile Photo

📰 86M AT&T customer records leaked, including SSNs. ☁️Trey: “We’re all exhausted by breaches… but the bigger question is how cascading failures keep letting them happen.” Read what sets this specific leak apart and why it's a concern for everyone: informationsecuritybuzz.com/att-data-leak-…

bugcrowd (@bugcrowd) 's Twitter Profile Photo

🚨 Security Flash: CVE-2025-0133 Bugcrowd Founder cje and Sr. Manager of Security Operations Von T. discuss the situation in depth. You’ll find the full video right here: bugcrowd.com/blog/what-you-…

🚨 Security Flash: CVE-2025-0133

Bugcrowd Founder <a href="/caseyjohnellis/">cje</a> and Sr. Manager of Security Operations Von T. discuss the situation in depth.

You’ll find the full video right here: bugcrowd.com/blog/what-you-…
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Big programs have already been hit by pentesters and red teams. So how do top hackers still find crits? Here’s how they outlast, outsmart, and out-hack the crowd👇 1️⃣ Understand your position in the lifecycle You’re testing systems that have already survived audits. This

Big programs have already been hit by pentesters and red teams.

So how do top hackers still find crits?

Here’s how they outlast, outsmart, and out-hack the crowd👇

1️⃣ Understand your position in the lifecycle

You’re testing systems that have already survived audits. This
bugcrowd (@bugcrowd) 's Twitter Profile Photo

It’s Wednesday, you know what that means... 📝 Time for a pop quiz! Do you know a red team red flag when you see one? Take the test: bugcrowd.com/blog/pop-quiz-…

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Plot twist: Some Chrome extensions meant for privacy are leaking your data instead. 😬 ☁️Trey: "These tools create a new attack surface. They expose users to spying and compromise.” Your privacy might be at risk where you least expect it. Learn more: csoonline.com/article/400354…