Do security researchers and ethical hackers learn more about cybersecurity from their employer, schooling or bug bounty experience? The Ethical Hacker Insights Report 2022 surveyed 1,181 people with cybersecurity experience to learn more.
Foregrounding transparency can go a long way in securing your organization's technology and workforce, according to four cybersecurity experts from Intel. Suzy Greenberg, Vice President of Communications and Incident Response; Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy discussed transparency in bug bounty and vulnerability disclosure programs, as well as gender parity in cybersecurity.
To celebrate the anniversary of its Vulnerability Reward Program and ensure the next 10 years are just as successful and collaborative, Google announced the launch of its new platform, bughunters.google.com. The new site brings all VRPs (Google, Android, Abuse, Chrome and Play) closer together and provides a single intake form that makes it easier for bug hunters to submit issues.
Researchers at at Positive Technologies have published a proof-of-concept exploit for CVE-2020-3580. There are reports of researchers pursuing bug bounties using this exploit.
After auditing the security of Helpdesk Software solution Deskpro in accordance with the company's Responsible Disclosure Bug Bounty Program, the Checkmarx Security Research Team discovered a severe cross-site scripting (XSS) issue that can be exploited multiple ways.
The cybersecurity industry has been around for more than 30 years and undergone exponential growth, but in many ways it is still defining itself in the face of evolving threats. Technology and process are predictably playing a role. But diversity of talent has also become increasingly important to the success of security organizations and is redefining the role of a cybersecurity professional.
Security-minded organizations know that the next cyber threat may be the worst. That’s why they take preemptive measures to protect their most valuable assets.