Researchers can report vulnerabilities on a ‘no blame’ basisNew Zealand’s Government Communications Security Bureau (GCSB) has advised government agencies to introduce vulnerability disclosure policies (VDPs).The GCSB said agencies should establish a...
Every month, the Capture The Bug team will be shining a spotlight on some of the amazing security researchers and penetration testers from our community of over 1000 professionals.Today, we’re excited to share the story of Gayatri and her journey int...
Bug bounty programs have become increasingly popular among businesses looking to improve their cybersecurity posture.These programs allow companies to crowdsource their vulnerability assessments, paying researchers or ethical hackers to find and repo...
https://blog.projectdiscovery.io/community-powered-scanning-with-nuclei/Projectdiscovery’s Nuclei is a popular open-source scanning engine designed to help security researchers automate the process of detecting security vulnerabilities in web applica...
https://github.com/projectdiscovery/nucleiIn the ever-evolving landscape of cybersecurity, staying ahead of threats requires utilizing advanced tools and techniques. One such tool, Nuclei, has emerged as a game-changer for bug bounty hunters and secu...
As cyber threats become more advanced and frequent, businesses are increasingly realizing the importance of protecting their digital assets. While many organizations have dedicated security teams, they may not be able to keep up with the constantly e...
https://lexica.art/prompt/2db042a2-3b8c-4abb-9672-9b240fdd9767In today’s world, data breaches, and cyber-attacks are becoming increasingly common. As businesses and individuals continue to rely more on technology, the importance of securing sensitive...
https://unsplash.com/photos/viS6-ja0dCwPenetration testing is a vital process for assessing the security posture of an organization’s systems and networks. It involves simulating real-world attacks by ethical hackers who try to exploit vulnerabilitie...
Partnership Announcement: Credshields & Capture The Bug Join Forces to Offer Unmatched Security SolutionsWe are thrilled to announce a new partnership between two of the leading companies in the security industry: Credshields and Capture The Bug....
Photo by Vishnu R Nair on UnsplashWhat is a cookie and why is it used?HTTP is a stateless protocol, which means that it can’t distinguish between 2 consecutive requests originating from the same computer or network or user. This was a major problem....