Kraken Says Hackers Turned to 'Extortion' After Exploiting Bug for $3MKraken fixed a vulnerability discovered by researchers who then attempted 'extortion' by withdrawing funds and refusing to return without a payout.
Apple is challenging hackers to break into the company's serversApple is challenging hackers to secure its Private Cloud Compute with a $1 million reward for successful breaches, enhancing its commitment to cybersecurity.
Strengthening Cybersecurity: Breaking Down inDrive's Bug Bounty Program | HackerNooninDrive's bug bounty program enhances cybersecurity through collaboration with white hat hackers, enabling better vulnerability detection and improved security processes.
TikTok Announces Activations for Cybersecurity Awareness MonthTikTok emphasizes user safety by sharing cybersecurity tips and promoting community engagement during Cybersecurity Month.
Kraken Says Hackers Turned to 'Extortion' After Exploiting Bug for $3MKraken fixed a vulnerability discovered by researchers who then attempted 'extortion' by withdrawing funds and refusing to return without a payout.
Apple is challenging hackers to break into the company's serversApple is challenging hackers to secure its Private Cloud Compute with a $1 million reward for successful breaches, enhancing its commitment to cybersecurity.
Strengthening Cybersecurity: Breaking Down inDrive's Bug Bounty Program | HackerNooninDrive's bug bounty program enhances cybersecurity through collaboration with white hat hackers, enabling better vulnerability detection and improved security processes.
TikTok Announces Activations for Cybersecurity Awareness MonthTikTok emphasizes user safety by sharing cybersecurity tips and promoting community engagement during Cybersecurity Month.
Apple Intelligence bug bounty invites researchers to test its privacy claimsApple is inviting security investigations into its Private Cloud Compute to bolster privacy and secure its AI capabilities.The company expanded its bug bounty program significantly to incentivize security research around its PCC system.
Adobe Adds Firefly and AI Watermarking to Bug Bounty ProgramSecurity researchers in Adobe's bug bounty program can now earn rewards for finding vulnerabilities in Adobe Firefly and Content Credentials.
Meta brushes off risk of account theft via number recyclingTelecom companies recycling phone numbers can lead to malicious account takeovers.Meta (formerly Facebook) sees phone number reuse as a concern but doesn't consider it eligible for its bug bounty program.
Researcher finds flaw in a16z website that exposed some company data | TechCrunchA security vulnerability was found in a web app used by a16z, exposing data but now fixed.