112 blog posts published by month since the start of 2025. Start from a different year:

Posts year-to-date
112 (88 posts by this month last year.)
Average posts per month since 2025
9.3

Post details (2025 to today)

Title Author Date Word count HN points
A guide to Bluetooth Low Energy hacking: Part II Andrew Pratt Jan 09, 2025 2907 -
Taking platform support for CVSS to the next level Abigail Nguy Jan 14, 2025 255 -
Shaping the future of cybersecurity: The Hacking Policy Council’s 2024 achievements and vision for 2025 Casey Ellis Jan 15, 2025 1148 -
Security flash: Salt Typhoon Erica Azad Jan 16, 2025 386 -
Bugcrowd’s Bugboss Fighter Challenge Santerra Holler Jan 21, 2025 286 -
MFA security part 1: How attackers bypass multi-factor authentication Alistair G, Director of Red Team Operations Jan 22, 2025 2100 -
Managing the cost implications of EU DORA compliance Julian Brownlow Davies Jan 23, 2025 1064 -
The new (de)regulated AI security space: A hacker’s perspective Guest Post Jan 27, 2025 1310 -
Hacking Crypto Part I Nerdwell Jan 30, 2025 4781 -
The EU Cyber Resilience Act (CRA), explained Gareth O Sullivan Feb 11, 2025 923 -
Continuous security testing for DORA compliance Julian Brownlow Davies Jan 29, 2025 989 -
The EU AI Act, explained Gareth O Sullivan Feb 06, 2025 890 -
MFA security part 2: How to prevent MFA bypass Alistair G, Director of Red Team Operations Feb 11, 2025 626 -
Point-in-time vs. continuous penetration testing: A comparison guide Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 03, 2025 891 -
Hacker spotlight: Meet Nerdwell Santerra Holler Feb 05, 2025 1531 -
Crowdsourced intelligence in action: Bugcrowd’s 2024 year in review Dave Gerry Feb 04, 2025 943 -
The ultimate beginner’s guide to Nuclei Andrew Pratt Feb 13, 2025 2550 -
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update Paddy Cassidy Feb 12, 2025 553 -
Bugcrowd security flash: CFAA and thought crime Erica Azad Feb 13, 2025 558 -
How to hack WiFi Andrew Pratt Feb 26, 2025 2831 -
Hacker Experience Surveys: Amplifying your voice at Bugcrowd Emma Feb 19, 2025 1415 -
A look inside global collegiate pen testing Bugcrowd Feb 21, 2025 1990 -
Hacking crypto part II: Hacking blockchains for fun and profit Nerdwell Feb 20, 2025 4070 -
The biggest security risks facing the maritime shipping industry Julian Brownlow Davies Feb 27, 2025 1191 -
Hacking LLM applications: A meticulous hacker’s two cents Guest Post Feb 27, 2025 3438 -
A hacker breaks down Netflix’s new show, Zero Day Guest Contributor Mar 06, 2025 1900 -
What you need to know about H.R. 872 Casey Ellis Mar 06, 2025 488 -
Hardware hacking with the University of New Brunswick Cybersec Club Bugcrowd Researcher Success Mar 04, 2025 705 -
Secure by Design: From pledge to practice Casey Ellis Mar 05, 2025 665 -
Best practices to avoid Bugcrowd platform violations Guest Post Mar 12, 2025 1112 -
The rise of device code phishing Alistair G, Director of Red Team Operations Mar 11, 2025 1407 -
Safe harbor and the future of AI flaw reporting: Lessons from vulnerability disclosure Casey Ellis Mar 13, 2025 1142 -
Announcing the new women-only hacking community: HackerHER Network Emma Mar 13, 2025 809 -
Red teaming vs. penetration testing: A guide to comprehensive security testing Justin Kestelyn, Bugcrowd Head of Product Marketing Mar 13, 2025 1656 -
Why AI will never replace the Crowd Julian Brownlow Davies Mar 19, 2025 899 -
Remote code execution (RCE) 101 Guest Post Mar 26, 2025 1092 -
A ​​low-cost hacking sidekick: Baby steps to using offensive AI agents Ads Dawson Mar 27, 2025 3235 -
Hacking the stars: My experience with NASA’s VDP Santerra Holler Apr 01, 2025 1033 -
Bugcrowd Security Update: Password Reset and MFA Requirement Santerra Holler Apr 07, 2025 232 -
Reflecting on the fourth Hacker Showdown: Carnival of ChAIos Santerra Holler Apr 08, 2025 632 -
The ultimate beginner’s guide to Android hacking Andrew Pratt Apr 09, 2025 3337 -
XSSpect: A browser extension to automate XSS injection Phishician Apr 09, 2025 930 -
Security through the attacker’s lens: How to adopt an adversarial mindset Erica Azad Apr 10, 2025 1303 -
Hacker spotlight: Rhynorater Santerra Holler Apr 15, 2025 1248 -
Everything you need to know about working with hackers Erica Azad Apr 22, 2025 892 -
A course on Caido at the University of Arizona Santerra Holler Apr 23, 2025 628 -
New platform capability: Automate retesting using AI-generated Nuclei templates Michael Skelton, VP of Operations Apr 22, 2025 343 -
A hacker explains the recent crosswalk signal hijacks Guest Post Apr 23, 2025 1052 -
Introducing Bugcrowd Red Team as a Service (RTaaS) Julian Brownlow Davies Apr 28, 2025 2042 -
VDP Success: Lessons from the State of California’s Department of Technology Erica Azad Apr 30, 2025 1597 -
How to standout with better security: Your guide to proactive security Bugcrowd Apr 29, 2025 695 -
Hacker spotlight: P3t3r_R4bb1t Santerra Holler Apr 30, 2025 1112 -
Community spotlight: ClassDojo Erica Azad May 07, 2025 833 -
How to retain hackers on your engagement Rami Tawil May 06, 2025 1475 -
Bugcrowd’s commitment to CISA’s “Secure by Design” Pledge Trey Ford May 05, 2025 797 -
Explain it like I’m five: Artificial Intelligence Andrew Pratt May 08, 2025 1793 -
Community spotlight: Sendbird Erica Azad May 14, 2025 736 -
Your hacking style based on your zodiac sign Erica Azad May 21, 2025 2096 -
Introducing the Engagement Simulator: Your blueprint for bug bounty ROI Abigail Nguy May 15, 2025 658 -
Pentester spotlight: Alx Santerra Holler May 22, 2025 1360 -
Hacking AI applications: In the trenches with DSPy Ads Dawson May 13, 2025 4419 -
HackHER spotlight: Meet InsiderPhD Santerra Holler May 20, 2025 1513 -
Securing global cybersecurity: Why CISA, CVE, and other global initiatives matter Casey Ellis May 21, 2025 923 -
A basic guide to iOS testing Guest Post May 29, 2025 3277 -
Hacker spotlight: Ruikai Peng Santerra Holler May 28, 2025 1760 -
Behind the scenes: How Bugcrowd builds red teams Erica Azad Jun 05, 2025 2631 -
Bolt launches its public bug bounty engagement with Bugcrowd to secure its mobility app Erica Azad Jun 04, 2025 661 -
Hacking crypto Part III: Hardware Nerdwell Jun 10, 2025 3111 -
Rigging the system: The art of AI exploits Ads Dawson Jun 11, 2025 1852 -
Pop quiz: Red team red flags Erica Azad Jun 12, 2025 1691 -
Introduction to UART hardware hacking Guest Post Jun 17, 2025 1341 -
How to find bugs on a hardened target using gadgets Guest Post Jul 16, 2025 2915 -
Tips to break into a career in cybersecurity Erica Azad Jun 24, 2025 1018 -
Security isn’t static: Why your strategy should evolve like your threats Julian Brownlow Davies Jul 22, 2025 2982 -
Welcome Umesh Shankar to the Bugcrowd Advisory Board Erica Azad Jul 08, 2025 776 -
Welcome Antonio Bovoso to the Bugcrowd Advisory Board Erica Azad Jul 29, 2025 535 -
What you need to know about CVE-2025-0133 Erica Azad Jun 18, 2025 174 -
Hacker opinion piece | Will artificial intelligence replace hackers? Guest Post Jul 21, 2025 1363 -
Join Bugcrowd and Hack the Box for the ultimate CTF Santerra Holler Jun 24, 2025 438 -
Why blending human intuition with automation is the future of hacking Guest Post Jul 24, 2025 2046 -
Access Control vs Account Takeover: What Bug Bounty Hunters Need to Know Guest Post Jul 03, 2025 1731 -
Top pentester: Nerdwell Bugcrowd Aug 05, 2025 1303 -
Getting to know the Crowd: Answers to your top 7 questions on trust Justin Kestelyn, Bugcrowd Head of Product Marketing Aug 06, 2025 922 -
Community Leader of the year: sw33tLie Bugcrowd Aug 04, 2025 1046 -
The Breakthrough Hacker of 2025: bronxi Bugcrowd Aug 07, 2025 1093 -
The guide to blind XSS: Advanced techniques for bug bounty hunters worth $250,000 Guest Post Aug 12, 2025 1213 -
Security flash: Resilience over fear Bugcrowd Jun 23, 2025 306 -
Amplify your red team’s impact with Bugcrowd’s RTaaS Erica Azad Jul 10, 2025 1590 -
Bugcrowd names Trey Ford as Chief Strategy and Trust Officer Erica Azad Aug 04, 2025 1035 -
Top P1 Hacker: priyanshuxo Bugcrowd Aug 06, 2025 1077 -
Mobile Hacking Resource Kit: Your one‑stop hub for iOS and Android pen testing Santerra Holler Jun 19, 2025 1187 -
Making a difference with a suicide prevention bot Guest Post Jul 02, 2025 1538 -
Introducing Bugcrowd Asset View: Turn assets into actions Abigail Nguy | Senior Product Manager Aug 05, 2025 965 -
Global Security Impact Award winner: T-Mobile Bugcrowd Aug 08, 2025 775 -
Introducing Bugcrowd’s Security Innovation Lab Erica Azad Jul 23, 2025 596 -
Announcing the Bugcrowd Ingenuity Awards: Celebrating excellence among hackers and industry leaders Santerra Holler Jul 10, 2025 356 -
The ultimate beginner’s guide to Caido Andrew Pratt Jun 25, 2025 4163 -
Bugcrowd AI Connect: Bringing vulnerability data to AI applications Paddy Cassidy Aug 05, 2025 694 -
What Mission Impossible taught us about AI: The hacker roots of a face swap Ads Dawson Aug 20, 2025 1761 -
Hacker spotlight: Olufela Osideko Santerra Holler Aug 19, 2025 1139 -
How I hacked my way to the big leagues: Fat bounties, interviews on NASDAQ, and advisory boards Ads Dawson Aug 19, 2025 3110 -
A CISO’s guide to red teaming part 1: The role of red teaming in cybersecurity strategies Alistair G, Director of Red Team Operations Aug 21, 2025 1613 -
Bugcrowd AI Triage speeds vulnerability resolution and elevates hacker experience Braden Russell Aug 20, 2025 677 -
Hacker spotlight: Bronxi Santerra Holler Aug 26, 2025 1228 -
Bugcrowd response to Salesforce-linked third-party Drift application security event Nick McKenzie | Bugcrowd CIO and CSO Aug 27, 2025 277 -
A CISO’s guide to red teaming part 2: Using red team outcomes for executive decision making Alistair G, Director of Red Team Operations Aug 28, 2025 2092 -
A CISO’s guide to red teaming part 3: Going beyond technical vulnerabilities with red teaming Alistair G, Director of Red Team Operations Sep 04, 2025 1481 -
The two faces of bug bounty hunting: Systemic vs. manual approaches Guest Post Sep 03, 2025 957 -
Update: Bugcrowd Response to Salesloft Drift Third-Party Security Event Nick McKenzie | Bugcrowd CIO and CSO Sep 05, 2025 427 -
When attackers log in as you: Understanding broken authentication and session management risks Guest Post Sep 10, 2025 1002 -
Welcome to The Mind Cathedral Omar Carmical Sep 10, 2025 670 -
Short-term satisfaction for long-term pain: Server security misconfigurations Guest Contributor Sep 16, 2025 1048 -