Meta has paid a bug bounty to a researcher for disclosing the details of a two-factor authentication vulnerability for confirming a phone number, and the email address did not have…
A threat actor has leaked data of 5.4 million Twitter accounts last month that were obtained by exploiting a now-fixed vulnerability in the popular social media platform. Stolen data offered for sale…
HackerOne says an employee stole vulnerability disclosure reports submitted via its platform to claim the bounty from the company's partners for themselves. Bug bounty programs are initiated by companies to…
LinkedIn’s invite-only bug bounty program has been running since 2014 getting replaced by a public bug bounty. Security vulnerabilities that are rated critical which are discovered on the business-oriented platform…
Security vulnerabilities in Apple iCloud and Safari 15 could have enabled attackers to compromise macOS webcams and can victimise online users A reward of $100,500 bug bounty for the universal…
Researchers has discovered more than 70 flaws in combinations of cloud applications and content delivery networks (CDNs) that could be used to poison the CDN caches and result in DoS…
Big hunters have already submitted thousands of vulnerability reports related to the Apache Log4j bug that continues to send shockwaves through the global software ecosystem. The critical, CVSS 10-rated flaw…
Zerodium an exploit purchase agency announced that it’s looking to buy zero-day exploits targeting popular VPN software. Specifically wants to acquire exploits that work against the Windows versions of the…