eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

218
active users

#BugBounty

0 posts0 participants0 posts today
Michaelpaulino<p><a href="https://mastodon.social/tags/michaelpaulino" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>michaelpaulino</span></a> remains one of the top <a href="https://mastodon.social/tags/digital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digital</span></a> <a href="https://mastodon.social/tags/artist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artist</span></a> <a href="https://mastodon.social/tags/journalist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>journalist</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> I mean His API testing with <a href="https://mastodon.social/tags/postman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postman</span></a> is garnering some serious attention from <a href="https://mastodon.social/tags/siliconvalley" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siliconvalley</span></a></p>
Olly 👾<p>Google paid $12 Million in Bug Bounties last Year</p><p>Google revamped the Vulnerability Reward Program [VRP] reward structure, bumping rewards up to a maximum of $151,515, while its Mobile VRP now offers up to $300,000 for critical vulnerabilities in top-tier apps [with a maximum reward reaching $450,000 for exceptional quality reports].</p><p><a href="https://security.googleblog.com/2025/03/vulnerability-reward-program-2024-in.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.googleblog.com/2025/0</span><span class="invisible">3/vulnerability-reward-program-2024-in.html</span></a></p><p><a href="https://nerdculture.de/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://nerdculture.de/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://nerdculture.de/tags/rewards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rewards</span></a> <a href="https://nerdculture.de/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://nerdculture.de/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://nerdculture.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://nerdculture.de/tags/engineer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>engineer</span></a> <a href="https://nerdculture.de/tags/media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>media</span></a> <a href="https://nerdculture.de/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://nerdculture.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Marcel Waldvogel<p>Also, haben sich einige gedacht, ich lasse mir doch von KI angebliche Fehler suchen und melde die im <a href="https://waldvogel.family/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a>-Programm. Ungeprüft. Denn den Meldenden entsteht ja weniger Aufwand, sie ungetestet zu melden, als wenn sie es vorher erst testen müssen.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bagder</span></a></span> hat das Problem und seinen Ärger letztes Jahr schon beschrieben.<br><a href="https://daniel.haxx.se/blog/2024/01/02/the-i-in-llm-stands-for-intelligence/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">daniel.haxx.se/blog/2024/01/02</span><span class="invisible">/the-i-in-llm-stands-for-intelligence/</span></a></p><p>Und ich habe mir mal die Mühe gemacht, etliche dieser angeblichen Bug Reports zu lesen. Und kann seinen Ärger voll verstehen.<br><a href="https://hackerone.com/curl/hacktivity?type=team" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackerone.com/curl/hacktivity?</span><span class="invisible">type=team</span></a></p>
Marcel Waldvogel<p>7️⃣ Auf alle Fälle gibt es dokumentierte Fälle, in denen Softwareentwickler *wegen <a href="https://waldvogel.family/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a>* Zeit verschwenden.</p><p><a href="https://waldvogel.family/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a>-Programme dienen dazu, dass Leute, die Sicherheitsprobleme in Software finden, diese kontrolliert den Entwicklern melden können und dafür belohnt werden.</p><p>D.h. es gibt Anreize, Bugs zu melden, weil man könnte ja etwas damit verdienen. Und es gibt kaum Nachteile.<br><a href="https://dnip.ch/2025/05/20/dnip-briefing-25-zuckerbergs-sammelwut-und-was-man-dagegen-tun-kann/#Macht-KI-Entwickler-effizienter" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/05/20/dnip-briefi</span><span class="invisible">ng-25-zuckerbergs-sammelwut-und-was-man-dagegen-tun-kann/#Macht-KI-Entwickler-effizienter</span></a></p>
TechNadu<p>In this interview, TechNadu presents updates from ExpressVPN’s Chief Research Officer, Dr. Peter Membrey(@pmembrey).</p><p>Dr. Membrey discussed the creation of Lightway, VPNs transitioning from standalone apps to essential components of digital infrastructure, and the passion for solving problems as a compass that guides one’s career path.</p><p>He elaborated on his experience with quantitative analysis, VPNs being a piece of a larger privacy puzzle, and making an impact instead of merely building products.</p><p>In this interview, read expert insights from Dr. Peter Membrey about:</p><p>⭕Transitioning from incremental improvements to creating something that offers constant connectivity<br>⭕Reasons behind rewriting ‘Lightway’ in Rust from the C programming language<br>⭕Posting the largest bug bounty ($100,0000 USD) in the history of the Bugcrowd platform that remains unclaimed so far</p><p>🔗Read our full Interview: <a href="https://technadu.com/expressvpn-building-the-future-of-privacy-rust-powered-protocols-zero-knowledge-embeddable-vpns/595008/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">technadu.com/expressvpn-buildi</span><span class="invisible">ng-the-future-of-privacy-rust-powered-protocols-zero-knowledge-embeddable-vpns/595008/</span></a></p><p>🔔 👉 Follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@technadu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>technadu</span></a></span> for more Expert Insights and share your views in the comments below.</p><p><a href="https://infosec.exchange/tags/ExpressVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExpressVPN</span></a> <a href="https://infosec.exchange/tags/Lightway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lightway</span></a> <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://infosec.exchange/tags/TechNadu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNadu</span></a> <a href="https://infosec.exchange/tags/Bugcrowd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bugcrowd</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/TrustedServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrustedServer</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
Baklava Monster<p>inspired by a recent <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> report:</p><p>PROD DATA IN STAGING/TEST/DEV, NOT EVEN ONCE!!1</p><p><a href="https://youtu.be/VC_pw2OHr7k" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/VC_pw2OHr7k</span><span class="invisible"></span></a></p>
JayeLTee<p>Looking for some help, boosts appreciated: </p><p>Anyone with a security contact at Disney or ABC Network?</p><p>I know Disney has a bug bounty program, but the issue is with a third-party software leaking data from multiple companies. </p><p>Found no information as to who owns the software online and would like some help figuring out who to notify.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/disney" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disney</span></a> <a href="https://infosec.exchange/tags/abc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>abc</span></a> <a href="https://infosec.exchange/tags/responsibledisclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>responsibledisclosure</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
KINEWS24<p>🚨 Bis zu $25.000 für KI-Hacks? Anthropic startet neues Sicherheitsprogramm – Was steckt dahinter? 🔍</p><p>• Test: Claude 3.7 Sonnet<br>• Fokus: universelle Jailbreaks<br>• Nur für geladene Red Teamer</p><p><a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/ki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ki</span></a> <a href="https://mastodon.social/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artificialintelligence</span></a> <a href="https://mastodon.social/tags/Anthropic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anthropic</span></a> <a href="https://mastodon.social/tags/Claude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Claude</span></a> <a href="https://mastodon.social/tags/KISicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KISicherheit</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p><p>Jetzt LIKEN, teilen, LESEN und FOLGEN! Schreib uns in den Kommentaren!</p><p><a href="https://kinews24.de/ki-sicherheit-2025-anthropic-testet-claude-schutz/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kinews24.de/ki-sicherheit-2025</span><span class="invisible">-anthropic-testet-claude-schutz/</span></a></p>
Tib3rius :antiverified:<p>Which lesser-known Burp extensions do you swear by? Share your favorites below! 👇</p><p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/BurpSuite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BurpSuite</span></a> <a href="https://infosec.exchange/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a></p>
Konstantin :C_H:<p>&lt;script&gt;alert(1)&lt;/script&gt; - 403 Forbidden<br>&lt;img src=x onerror=console.log(1)&gt; - 403 Forbidden<br>&lt;svg onload=print()&gt; - 403 Forbidden</p><p>I've recently encountered a web application firewall in a pentest, blocking all my attempts to insert an XSS payload.</p><p>In such cases, I love to use the <a href="https://infosec.exchange/tags/PortSwigger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PortSwigger</span></a> cross-site scripting cheat sheet: <a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">portswigger.net/web-security/c</span><span class="invisible">ross-site-scripting/cheat-sheet</span></a></p><p>I copied all payloads to the clipboard, pasted them into the Intruder's word list and hit the "Start attack" button.</p><p>Within seconds, I had a working proof of concept.</p><p>How do you use the XSS cheat sheet? I'm keen to know!</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p>
ByteSectorX<p>The Rise of Artificial Intelligence in Cybersecurity: What to Expect</p><p><a href="https://bytesectorx.blogspot.com/2024/11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bytesectorx.blogspot.com/2024/</span><span class="invisible">11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html</span></a></p><p><a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/ArtificialInteligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialInteligence</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/CYBER" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CYBER</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Marco Ivaldi<p>A couple of days ago, I unearthed my first <a href="https://infosec.exchange/tags/computer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computer</span></a>, an <a href="https://infosec.exchange/tags/MSX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSX</span></a> straight from the ‘80s. It was lost in some box in the basement for who knows how long. Just feeling its power switch gave me the goosebumps…</p><p>This discovery came after sharing my hacker’s origin story with Nic Fillingham and Wendy Zenone in a new episode of Microsoft’s <a href="https://infosec.exchange/tags/BlueHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueHat</span></a> <a href="https://infosec.exchange/tags/Podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podcast</span></a>. </p><p><a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/52/notes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberwire.com/podcasts/the-</span><span class="invisible">bluehat-podcast/52/notes</span></a></p><p>Join us while we chat about my first-ever <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>, overlooked <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> that continue to pose significant risks today, <a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> and <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> security, my unexpected journey into <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> hunting and my involvement in the <a href="https://infosec.exchange/tags/ZeroDayQuest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDayQuest</span></a>, how to learn new things, mentorship and positive leadership, and of course pineapple pizza 🍍🍕</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> now pays up to $30,000 for some <a href="https://mastodon.thenewoil.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> vulnerabilities</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-now-pays-up-to-30-000-for-some-ai-vulnerabilities/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-now-pays-up-to-30-000-for-some-ai-vulnerabilities/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Scopify is a Python-based recon tool for pentesters, leveraging `netify.ai` to analyze CDNs, hosting, and SaaS infra of target companies. Optional OpenAI integration adds AI-guided insights for deeper testing. Built by <span class="h-card" translate="no"><a href="https://infosec.exchange/@Jhaddix" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jhaddix</span></a></span> &amp; Arcanum-Sec. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/Arcanum-Sec/Scopify" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Arcanum-Sec/Scopify</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Discernible<p>🪲 New Security Communication Drill: The Bug Bounty Researcher's Perspective</p><p>Join us tomorrow for an interactive security communication drill that flips the script on traditional security exercises. Instead of focusing on the vendor side, we'll put participants in the shoes of security researchers navigating the challenges of vulnerability disclosure.</p><p>This hands-on scenario will challenge you to:</p><p>🐛 Navigate security assessments with limited visibility into internal architectures</p><p>🐞 Build credibility when you have less system context than internal teams</p><p>🐛 Communicate effectively through multi-layered teams (triage vendors vs. security engineers)</p><p>🐞 Balance respect for internal expertise while confidently advocating for your findings</p><p> 🐛 Manage disclosure expectations under tight time constraints</p><p>🐞 Push for security improvements without full visibility into compensating controls</p><p>Whether you're a security researcher, bug bounty program manager, or security engineer, this drill offers valuable insights into improving communications in the vulnerability disclosure process from both sides.</p><p>🗓️ Date: Wednesday, April 23 <br>🕰️ Time: 12pm ET <br>🗺️ Location: Discernible Drills Slack </p><p>🔥 Subscribe to Join: DiscernibleInc.com/drills</p><p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
Blue Headline - Tech News<p>🚨 AI tool solves cyber tasks 3,600× faster than humans.<br>It’s called CAI—and it’s open-source, autonomous, and already winning real CTFs.</p><p>The best part? Even non-professionals using CAI have reported confirmed bugs to major bug bounty platforms.</p><p>Could this reshape who gets to participate in cybersecurity?</p><p>Read more: <a href="https://blueheadline.com/cybersecurity/cai-ai-hacker-tool-faster/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blueheadline.com/cybersecurity</span><span class="invisible">/cai-ai-hacker-tool-faster/</span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/BlueHeadline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueHeadline</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/AItools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AItools</span></a></p>
Marcel SIneM(S)US<p>Belohnung für gefundene Sicherheitslücken in <a href="https://social.tchncs.de/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> :fediverse: -Software ausgelobt | Security <a href="https://www.heise.de/news/Belohnung-fuer-gefundene-Sicherheitsluecken-in-Fediverse-Software-ausgelobt-10338830.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Belohnung-fuer-g</span><span class="invisible">efundene-Sicherheitsluecken-in-Fediverse-Software-ausgelobt-10338830.html</span></a> <a href="https://social.tchncs.de/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> :mastodon: <a href="https://social.tchncs.de/tags/Pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixelfed</span></a> :pixelfed: <a href="https://social.tchncs.de/tags/Peertube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Peertube</span></a> :peertube: <a href="https://social.tchncs.de/tags/Friendica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Friendica</span></a> <a href="https://social.tchncs.de/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
The New Oil<p>A new security fund opens up to help protect the <a href="https://mastodon.thenewoil.org/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a></p><p><a href="https://techcrunch.com/2025/04/02/a-new-security-fund-opens-up-to-help-protect-the-fediverse/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/02/a-ne</span><span class="invisible">w-security-fund-opens-up-to-help-protect-the-fediverse/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
Peter N. M. Hansteen<p>And following the result of the poll, here is the whole thing in the raw: <a href="https://nxdomain.no/~peter/bugbounty/20250401_ahmedraslanco@gmail.com_bugbounty_plz_drift@nuug.no.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/bugbounty/2</span><span class="invisible">0250401_ahmedraslanco@gmail.com_bugbounty_plz_drift@nuug.no.txt</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://mastodon.social/tags/bugbunnies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbunnies</span></a> <a href="https://mastodon.social/tags/scriptkiddies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scriptkiddies</span></a> <a href="https://mastodon.social/tags/scammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scammers</span></a> <a href="https://mastodon.social/tags/spammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spammers</span></a> <a href="https://mastodon.social/tags/scambunnies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scambunnies</span></a></p>
Bálint Magyar<p>New article with many personal firsts:<br>- First bug on Google's Vulnerability Reward Program<br>- First remote code execution bug<br>- First 5-figure bug bounty<br>- First CVE</p><p>What a ride.</p><p><a href="https://bm.gy/gwdrce" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bm.gy/gwdrce</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/IndieSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IndieSec</span></a> <a href="https://mastodon.social/tags/IndieWeb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IndieWeb</span></a> <a href="https://mastodon.social/tags/SmallWeb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmallWeb</span></a></p>