Intigriti

Bug Bounty & Agile Pentesting Platform

Bug Bytes #121 – Free Burp Collaborator alternative, Hacking Chrome extensions & $28k Facebook Oauth account takeover

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. This issue covers the week from April 26 to May 3. Intigriti […]

Continue reading Continue reading

Penetration Testing Vs Bug Bounty Programs Explained

As the number of businesses operating online increases, data breaches have grown in intensity and frequency – meaning it’s never been more critical for organisations to strengthen their defence systems. Intigriti dives into the key differences between two commonly used security testing methods for businesses: Penetration testing vs bug bounty programs. By the end of this article, you’ll have a clear indication of what model is most suitable for your […]

Continue reading Continue reading

Hacksplained joins Intigriti to further enable community of 35.000 ethical hackers

Intigriti is proud to announce that Pascal Schulz, better known under his pseudonym ‘Hacksplained’ is joining the community team as hacker enablement manager . The Austria-based security researcher and educational content creator will focus on further growing the community team, enabling the power of the crowd through existing and new product lines, strengthening local partnerships, […]

Continue reading Continue reading

How To Debunk These 6 Common Bug Bounty Misconceptions

The value of bug bounty programs is recognised by well-known companies all over the world. However, there are still a few stubborn myths about the concept that persists. This article lists six of the most common misconceptions we hear when speaking to potential customers about bug bounty programs.   The truth about bug bounty programs  There is only one truth to what a bug bounty program […]

Continue reading Continue reading

The Ultimate Guide To VDP: How To Write A Vulnerability Disclosure Policy

If you’re thinking about inviting ethical hackers to work with you, you’re in the right place. This article will help you maximise the success of using ethical hackers by asking them to follow a vulnerability disclosure process. Before we explain how to write a vulnerability disclosure policy, let’s start by covering some of the basics.  […]

Continue reading Continue reading
  • 1
  • 2
  • 3
  • ...
  • 20
  • Next →