The Discovery of a Polygon Vulnerability Rewarded with a Prize to the Tune of $2 Million

A bug bounty reward worth $2 Million went to researcher Gerhard Wagner based on his discovery of a critical flaw located in Polygon’s Plasma Bridge. If successfully exploited, this Polygon…

U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn

Meanwhile, Zerodium’s quest to buy VPN exploits is problematic, researchers said. The launch of a standing offer to pay for Windows virtual private network (VPN) software zero-day exploits came to…

A Well-Known Bug Bounty Platform Wants Zero-day Exploits for Windows VPN Clients

Zerodium is a premium bug bounty platform created by cybersecurity specialists with zero-day exploit and vulnerability research experience. The goal of Zerodium is to gather together independent security researchers to…

TikTok, GitHub, Facebook Join Open-Source Bug Bounty

Threat Post – Threat Post – The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain. Tech giants want…

The Importance of Being the Leader in Public Vulnerability Research

Trend Micro – Trend Micro – To be your most resilient, your security vendor must have the breadth and depth of vulnerability knowledge necessary to detect both known and unknown…

J3rryBl4nks’s PEN-300 Approach

Guest post by J3rryBl4nks, OffSec student and OSCP holder My PEN-300 Approach My name is J3rryBl4nks. I have been in roles in information technology for 17 years. I started out…

Beat Cybercriminals at Their Own Game

Trend Micro – Trend Micro – According to Gartner, vulnerability exploitation is the cause of most information security breaches, and any breach can harm your business, diminish customer trust, impact…