#bug-bounty-program

[ follow ]
#cybersecurity

Kraken Says Hackers Turned to 'Extortion' After Exploiting Bug for $3M

Kraken fixed a vulnerability discovered by researchers who then attempted 'extortion' by withdrawing funds and refusing to return without a payout.

Apple is challenging hackers to break into the company's servers

Apple is challenging hackers to secure its Private Cloud Compute with a $1 million reward for successful breaches, enhancing its commitment to cybersecurity.

Strengthening Cybersecurity: Breaking Down inDrive's Bug Bounty Program | HackerNoon

inDrive's bug bounty program enhances cybersecurity through collaboration with white hat hackers, enabling better vulnerability detection and improved security processes.

TikTok Announces Activations for Cybersecurity Awareness Month

TikTok emphasizes user safety by sharing cybersecurity tips and promoting community engagement during Cybersecurity Month.

Kraken Says Hackers Turned to 'Extortion' After Exploiting Bug for $3M

Kraken fixed a vulnerability discovered by researchers who then attempted 'extortion' by withdrawing funds and refusing to return without a payout.

Apple is challenging hackers to break into the company's servers

Apple is challenging hackers to secure its Private Cloud Compute with a $1 million reward for successful breaches, enhancing its commitment to cybersecurity.

Strengthening Cybersecurity: Breaking Down inDrive's Bug Bounty Program | HackerNoon

inDrive's bug bounty program enhances cybersecurity through collaboration with white hat hackers, enabling better vulnerability detection and improved security processes.

TikTok Announces Activations for Cybersecurity Awareness Month

TikTok emphasizes user safety by sharing cybersecurity tips and promoting community engagement during Cybersecurity Month.
morecybersecurity

Apple Intelligence bug bounty invites researchers to test its privacy claims

Apple is inviting security investigations into its Private Cloud Compute to bolster privacy and secure its AI capabilities.
The company expanded its bug bounty program significantly to incentivize security research around its PCC system.

Adobe Adds Firefly and AI Watermarking to Bug Bounty Program

Security researchers in Adobe's bug bounty program can now earn rewards for finding vulnerabilities in Adobe Firefly and Content Credentials.

Meta brushes off risk of account theft via number recycling

Telecom companies recycling phone numbers can lead to malicious account takeovers.
Meta (formerly Facebook) sees phone number reuse as a concern but doesn't consider it eligible for its bug bounty program.

Researcher finds flaw in a16z website that exposed some company data | TechCrunch

A security vulnerability was found in a web app used by a16z, exposing data but now fixed.
[ Load more ]