All Articles

Articles in Bug Bounty and IT Security topics.

State of Vulnerability Disclosure: Key learnings from our eBook
September 26, 2023 · 7 min read

Discover the key findings from our survey with security professionals, including the value of VDP for all organizations, the benefits of strong cybersecurity practices, and the importance of positive relationships with ethical hackers.

The illusion of automated vulnerability scans: unveiling the risks and limitations
July 18, 2023 · 6 min read

While automated vulnerability scans provide a quick overview, they often leave critical gaps that can expose businesses to potential risks, giving you a false sense of security. Read our blog post on the limitations of automated vulnerability scans and the steps you can take for a holistic security approach.

Introducing HackGATE: the industry’s first managed gateway for security testing
June 29, 2023 · 4 min read

HackGATE, the industry's first managed gateway for monitoring security testing projects, allows organizations to streamline the auditing process, improve transparency, and separate ethical hackers from real-life attacks, empowering them to take control and ensure comprehensive security testing aligned with industry best practices.

How to protect your company from the unseen risks of AI-generated code
May 24, 2023 · 7 min read

AI-generated code is on the rise, but it comes with a major pitfall: it often contains vulnerabilities that can expose your company to malicious attacks. Read this blog post to learn the main risks of using AI tools to write code — and the steps you need to take to keep your code base secure.

3 key factors to consider for Penetration Testing (as a Service)
May 04, 2023 · 7 min read

Learn the key factors to consider when planning Penetration Testing as a Service. Discover how ethical hackers can help organizations comply with regulatory requirements and industry standards while improving customer confidence and trust in their products and services.

What is Managed Vulnerability Disclosure Policy (mVDP)?
March 03, 2023 · 5 min read

Find out what managed vulnerability disclosure policy is, how it works, and why you should consider using one.

January 16, 2023 · 7 min read

PostgreSQL Database Exfiltration through the abuse of PostgREST requests

January 04, 2022 · 4 min read

Full Account Takeover of ANY user via Insecure Direct Object Reference (IDOR) on reset password functionality

Safety Detectives interview with Hackrate
November 03, 2021 · 3 min read

An interview about our background, offers and competition.

BitNinja bug bounty program - after the first week of testing
May 20, 2021 · 2 min read

BitNinja bug bounty program launched on our platform a few days ago, so far more than 100 ethical hackers have joined. Why the ethical hackers like this program? What are the most important factors in building up your bug bounty program?