48 blog posts published by month since the start of 2025. Start from a different year:

Posts year-to-date
48 (49 posts by this month last year.)
Average posts per month since 2025
4.0

Post details (2025 to today)

Title Author Date Word count HN points
A guide to Bluetooth Low Energy hacking: Part II Andrew Pratt Jan 09, 2025 2907 -
Taking platform support for CVSS to the next level Abigail Nguy Jan 14, 2025 255 -
Shaping the future of cybersecurity: The Hacking Policy Council’s 2024 achievements and vision for 2025 Casey Ellis Jan 15, 2025 1148 -
Security flash: Salt Typhoon Erica Azad Jan 16, 2025 386 -
Bugcrowd’s Bugboss Fighter Challenge Santerra Holler Jan 21, 2025 286 -
MFA security part 1: How attackers bypass multi-factor authentication Alistair G, Director of Red Team Operations Jan 22, 2025 2100 -
Managing the cost implications of EU DORA compliance Julian Brownlow Davies Jan 23, 2025 1064 -
The new (de)regulated AI security space: A hacker’s perspective Guest Post Jan 27, 2025 1310 -
Hacking Crypto Part I Nerdwell Jan 30, 2025 4781 -
The EU Cyber Resilience Act (CRA), explained Gareth O Sullivan Feb 11, 2025 923 -
Continuous security testing for DORA compliance Julian Brownlow Davies Jan 29, 2025 989 -
The EU AI Act, explained Gareth O Sullivan Feb 06, 2025 890 -
MFA security part 2: How to prevent MFA bypass Alistair G, Director of Red Team Operations Feb 11, 2025 626 -
Point-in-time vs. continuous penetration testing: A comparison guide Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 03, 2025 891 -
Hacker spotlight: Meet Nerdwell Santerra Holler Feb 05, 2025 1531 -
Crowdsourced intelligence in action: Bugcrowd’s 2024 year in review Dave Gerry Feb 04, 2025 943 -
The ultimate beginner’s guide to Nuclei Andrew Pratt Feb 13, 2025 2550 -
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update Paddy Cassidy Feb 12, 2025 553 -
Bugcrowd security flash: CFAA and thought crime Erica Azad Feb 13, 2025 558 -
How to hack WiFi Andrew Pratt Feb 26, 2025 2831 -
Hacker Experience Surveys: Amplifying your voice at Bugcrowd Emma Feb 19, 2025 1415 -
A look inside global collegiate pen testing Bugcrowd Feb 21, 2025 1990 -
Hacking crypto part II: Hacking blockchains for fun and profit Nerdwell Feb 20, 2025 4070 -
The biggest security risks facing the maritime shipping industry Julian Brownlow Davies Feb 27, 2025 1191 -
Hacking LLM applications: A meticulous hacker’s two cents Guest Post Feb 27, 2025 3438 -
A hacker breaks down Netflix’s new show, Zero Day Guest Contributor Mar 06, 2025 1900 -
What you need to know about H.R. 872 Casey Ellis Mar 06, 2025 488 -
Hardware hacking with the University of New Brunswick Cybersec Club Bugcrowd Researcher Success Mar 04, 2025 705 -
Secure by Design: From pledge to practice Casey Ellis Mar 05, 2025 665 -
Best practices to avoid Bugcrowd platform violations Guest Post Mar 12, 2025 1112 -
The rise of device code phishing Alistair G, Director of Red Team Operations Mar 11, 2025 1407 -
Safe harbor and the future of AI flaw reporting: Lessons from vulnerability disclosure Casey Ellis Mar 13, 2025 1142 -
Announcing the new women-only hacking community: HackerHER Network Emma Mar 13, 2025 809 -
Red teaming vs. penetration testing: A guide to comprehensive security testing Justin Kestelyn, Bugcrowd Head of Product Marketing Mar 13, 2025 1656 -
Why AI will never replace the Crowd Julian Brownlow Davies Mar 19, 2025 899 -
Remote code execution (RCE) 101 Guest Post Mar 26, 2025 1092 -
A ​​low-cost hacking sidekick: Baby steps to using offensive AI agents Ads Dawson Mar 27, 2025 3235 -
Hacking the stars: My experience with NASA’s VDP Santerra Holler Apr 01, 2025 1033 -
Bugcrowd Security Update: Password Reset and MFA Requirement Santerra Holler Apr 07, 2025 232 -
Reflecting on the fourth Hacker Showdown: Carnival of ChAIos Santerra Holler Apr 08, 2025 632 -
The ultimate beginner’s guide to Android hacking Andrew Pratt Apr 09, 2025 3337 -
XSSpect: A browser extension to automate XSS injection Phishician Apr 09, 2025 930 -
Security through the attacker’s lens: How to adopt an adversarial mindset Erica Azad Apr 10, 2025 1303 -
Hacker spotlight: Rhynorater Santerra Holler Apr 15, 2025 1248 -
Everything you need to know about working with hackers Erica Azad Apr 22, 2025 892 -
A course on Caido at the University of Arizona Santerra Holler Apr 23, 2025 628 -
New platform capability: Automate retesting using AI-generated Nuclei templates Michael Skelton, VP of Operations Apr 22, 2025 343 -
A hacker explains the recent crosswalk signal hijacks Guest Post Apr 23, 2025 1052 -