Bug Bounty & Agile Pentesting Platform

How Artificial Intelligence is being used to match researchers with bug bounty programs

Every security researcher has their specialty, their range of bugs that they focus on or that they have spent the past years researching and perfecting. The greatest power of bug bounty comes into play when considering that all of these bright individuals with diverse skillsets can become a single superbrain when put together. At Intigriti, […]

Continue reading Continue reading

Bug Bytes #141 – Sesh Gremlin attack, RCE via password field & Pwning XMLSec for info disclosure and bounties

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. This issue covers the week from September 27 to October 4. Intigriti […]

Continue reading Continue reading

Using bug bounty programs to tackle cryptocurrency security challenges 

With cryptocurrency becoming a more regular investment, holders must take steps to protect their investments. One organisation that helps crypto holders do this is Safe Haven through its digital inheritance solution, Inheriti.  In this blog post, Intigriti sits down with Safe Haven’s Chief Technology Officer (CTO) and CEO, Jürgen Schouppe, to discuss cryptocurrency security challenges, as well as […]

Continue reading Continue reading
  • 1
  • 2
  • 3
  • ...
  • 26
  • Next →