71 blog posts published by month since the start of 2025. Start from a different year:

Posts year-to-date
71 (77 posts by this month last year.)
Average posts per month since 2025
5.9

Post details (2025 to today)

Title Author Date Word count HN points
A guide to Bluetooth Low Energy hacking: Part II Andrew Pratt Jan 09, 2025 2907 -
Taking platform support for CVSS to the next level Abigail Nguy Jan 14, 2025 255 -
Shaping the future of cybersecurity: The Hacking Policy Council’s 2024 achievements and vision for 2025 Casey Ellis Jan 15, 2025 1148 -
Security flash: Salt Typhoon Erica Azad Jan 16, 2025 386 -
Bugcrowd’s Bugboss Fighter Challenge Santerra Holler Jan 21, 2025 286 -
MFA security part 1: How attackers bypass multi-factor authentication Alistair G, Director of Red Team Operations Jan 22, 2025 2100 -
Managing the cost implications of EU DORA compliance Julian Brownlow Davies Jan 23, 2025 1064 -
The new (de)regulated AI security space: A hacker’s perspective Guest Post Jan 27, 2025 1310 -
Hacking Crypto Part I Nerdwell Jan 30, 2025 4781 -
The EU Cyber Resilience Act (CRA), explained Gareth O Sullivan Feb 11, 2025 923 -
Continuous security testing for DORA compliance Julian Brownlow Davies Jan 29, 2025 989 -
The EU AI Act, explained Gareth O Sullivan Feb 06, 2025 890 -
MFA security part 2: How to prevent MFA bypass Alistair G, Director of Red Team Operations Feb 11, 2025 626 -
Point-in-time vs. continuous penetration testing: A comparison guide Justin Kestelyn, Bugcrowd Head of Product Marketing Feb 03, 2025 891 -
Hacker spotlight: Meet Nerdwell Santerra Holler Feb 05, 2025 1531 -
Crowdsourced intelligence in action: Bugcrowd’s 2024 year in review Dave Gerry Feb 04, 2025 943 -
The ultimate beginner’s guide to Nuclei Andrew Pratt Feb 13, 2025 2550 -
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update Paddy Cassidy Feb 12, 2025 553 -
Bugcrowd security flash: CFAA and thought crime Erica Azad Feb 13, 2025 558 -
How to hack WiFi Andrew Pratt Feb 26, 2025 2831 -
Hacker Experience Surveys: Amplifying your voice at Bugcrowd Emma Feb 19, 2025 1415 -
A look inside global collegiate pen testing Bugcrowd Feb 21, 2025 1990 -
Hacking crypto part II: Hacking blockchains for fun and profit Nerdwell Feb 20, 2025 4070 -
The biggest security risks facing the maritime shipping industry Julian Brownlow Davies Feb 27, 2025 1191 -
Hacking LLM applications: A meticulous hacker’s two cents Guest Post Feb 27, 2025 3438 -
A hacker breaks down Netflix’s new show, Zero Day Guest Contributor Mar 06, 2025 1900 -
What you need to know about H.R. 872 Casey Ellis Mar 06, 2025 488 -
Hardware hacking with the University of New Brunswick Cybersec Club Bugcrowd Researcher Success Mar 04, 2025 705 -
Secure by Design: From pledge to practice Casey Ellis Mar 05, 2025 665 -
Best practices to avoid Bugcrowd platform violations Guest Post Mar 12, 2025 1112 -
The rise of device code phishing Alistair G, Director of Red Team Operations Mar 11, 2025 1407 -
Safe harbor and the future of AI flaw reporting: Lessons from vulnerability disclosure Casey Ellis Mar 13, 2025 1142 -
Announcing the new women-only hacking community: HackerHER Network Emma Mar 13, 2025 809 -
Red teaming vs. penetration testing: A guide to comprehensive security testing Justin Kestelyn, Bugcrowd Head of Product Marketing Mar 13, 2025 1656 -
Why AI will never replace the Crowd Julian Brownlow Davies Mar 19, 2025 899 -
Remote code execution (RCE) 101 Guest Post Mar 26, 2025 1092 -
A ​​low-cost hacking sidekick: Baby steps to using offensive AI agents Ads Dawson Mar 27, 2025 3235 -
Hacking the stars: My experience with NASA’s VDP Santerra Holler Apr 01, 2025 1033 -
Bugcrowd Security Update: Password Reset and MFA Requirement Santerra Holler Apr 07, 2025 232 -
Reflecting on the fourth Hacker Showdown: Carnival of ChAIos Santerra Holler Apr 08, 2025 632 -
The ultimate beginner’s guide to Android hacking Andrew Pratt Apr 09, 2025 3337 -
XSSpect: A browser extension to automate XSS injection Phishician Apr 09, 2025 930 -
Security through the attacker’s lens: How to adopt an adversarial mindset Erica Azad Apr 10, 2025 1303 -
Hacker spotlight: Rhynorater Santerra Holler Apr 15, 2025 1248 -
Everything you need to know about working with hackers Erica Azad Apr 22, 2025 892 -
A course on Caido at the University of Arizona Santerra Holler Apr 23, 2025 628 -
New platform capability: Automate retesting using AI-generated Nuclei templates Michael Skelton, VP of Operations Apr 22, 2025 343 -
A hacker explains the recent crosswalk signal hijacks Guest Post Apr 23, 2025 1052 -
Introducing Bugcrowd Red Team as a Service (RTaaS) Julian Brownlow Davies Apr 28, 2025 2042 -
VDP Success: Lessons from the State of California’s Department of Technology Erica Azad Apr 30, 2025 1597 -
How to standout with better security: Your guide to proactive security Bugcrowd Apr 29, 2025 695 -
Hacker spotlight: P3t3r_R4bb1t Santerra Holler Apr 30, 2025 1112 -
Community spotlight: ClassDojo Erica Azad May 07, 2025 833 -
How to retain hackers on your engagement Rami Tawil May 06, 2025 1475 -
Bugcrowd’s commitment to CISA’s “Secure by Design” Pledge Trey Ford May 05, 2025 797 -
Explain it like I’m five: Artificial Intelligence Andrew Pratt May 08, 2025 1793 -
Community spotlight: Sendbird Erica Azad May 14, 2025 736 -
Your hacking style based on your zodiac sign Erica Azad May 21, 2025 2096 -
Introducing the Engagement Simulator: Your blueprint for bug bounty ROI Abigail Nguy May 15, 2025 658 -
Pentester spotlight: Alx Santerra Holler May 22, 2025 1360 -
Hacking AI applications: In the trenches with DSPy Ads Dawson May 13, 2025 4419 -
HackHER spotlight: Meet InsiderPhD Santerra Holler May 20, 2025 1513 -
Securing global cybersecurity: Why CISA, CVE, and other global initiatives matter Casey Ellis May 21, 2025 923 -
A basic guide to iOS testing Guest Post May 29, 2025 3277 -
Hacker spotlight: Ruikai Peng Santerra Holler May 28, 2025 1760 -
Behind the scenes: How Bugcrowd builds red teams Erica Azad Jun 05, 2025 2631 -
Bolt launches its public bug bounty engagement with Bugcrowd to secure its mobility app Erica Azad Jun 04, 2025 661 -
Hacking crypto Part III: Hardware Nerdwell Jun 10, 2025 3111 -
Rigging the system: The art of AI exploits Ads Dawson Jun 11, 2025 1852 -
Pop quiz: Red team red flags Erica Azad Jun 12, 2025 1691 -
Introduction to UART hardware hacking Guest Post Jun 17, 2025 1341 -