mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#bugbounty

4 Beiträge4 Beteiligte0 Beiträge heute
nemo™ 🇺🇦<p>curl’s security team is drowning in low-quality “AI slop” reports—now 20% of all submissions, but only 5% are real bugs. The bug bounty program may need big changes to survive this onslaught. Read more on “Death by a thousand slops”: <a href="https://daniel.haxx.se/blog/2025/07/14/death-by-a-thousand-slops/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">daniel.haxx.se/blog/2025/07/14</span><span class="invisible">/death-by-a-thousand-slops/</span></a> 🐞🤖 <a href="https://mas.to/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mas.to/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://mas.to/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Wegen KI-Schrott – Curl-Entwickler erwägt Ende der Bug-Bounty-Prämien:<br>Minderwertige Bug-Reports belasten Open-Source-Entwickler immer stärker. Curl-Maintainer <span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bagder</span></a></span> zieht nun radikale Maßnahmen in Erwägung.«</p><p>Lasst mich raten, IT-Konzerne belasten Developer von Werkzeugen, die sie Täglich selber nutzen. Was ist daran intelligent oder gar künstlerisch?<br>/s</p><p>🤨 <a href="https://www.golem.de/news/wegen-ki-schrott-curl-entwickler-erwaegt-ende-der-bug-bounty-praemien-2507-198123.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/wegen-ki-schrott</span><span class="invisible">-curl-entwickler-erwaegt-ende-der-bug-bounty-praemien-2507-198123.html</span></a></p><p><a href="https://chaos.social/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> <a href="https://chaos.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://chaos.social/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://chaos.social/tags/ki" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ki</span></a> <a href="https://chaos.social/tags/belastung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>belastung</span></a> <a href="https://chaos.social/tags/entwickler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>entwickler</span></a> <a href="https://chaos.social/tags/kischrott" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kischrott</span></a> <a href="https://chaos.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Marcel Waldvogel<p>9️⃣ KI-generierte Meldungen von angeblichen Sicherheitslücken waren schon Thema bei <a href="https://waldvogel.family/tags/DNIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNIP</span></a>. Dort gab es aber wenigstens noch die Erklärung, dass die angeblichen Jäger von Sicherheitslücken auf die Belohnung aus waren, den sogenannten <a href="https://waldvogel.family/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a>. Nun melden aber auch andere Open-Source-Entwickler, dass sie unzählige Fehlermeldungen erhalten, die keinen Realitätsbezug haben. Offen bleibt, wieso hier KI aufs automatische Melden von Fehlern angesetzt wird.</p><p><a href="https://dnip.ch/2025/07/15/dnip-briefing-33-mcpasswort-mit-sicherheitsluecke/#Und-schliesslich" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/07/15/dnip-briefi</span><span class="invisible">ng-33-mcpasswort-mit-sicherheitsluecke/#Und-schliesslich</span></a></p>
daniel:// stenberg://<p>Death by a thousand slops</p><p><a href="https://daniel.haxx.se/blog/2025/07/14/death-by-a-thousand-slops/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">daniel.haxx.se/blog/2025/07/14</span><span class="invisible">/death-by-a-thousand-slops/</span></a></p><p><a href="https://mastodon.social/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Socket<p>🚨 New open source AI <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> framework outperforms humans in both speed and cost. It handles pen testing tasks like scanning and exploitation 3,600× faster and reduces costs by 156×. </p><p><a href="https://socket.dev/blog/open-source-framework-pen-testing-3600x-faster" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/open-source-fr</span><span class="invisible">amework-pen-testing-3600x-faster</span></a> <a href="https://fosstodon.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://fosstodon.org/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://fosstodon.org/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Baklava Monster<p>Currently playing a new game: «Prompt Jeopardy»</p><p>Submit a <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> report, the triage team must guess the prompt.</p><p>«i found a netscaler AAA on shodan, generate a bug bounty report for CVE-2025-5777»</p><p>I swear the results are as close as the submissions we receive 😭</p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Automate Your Recon: One API to Run All Your Pentesting Tools Instantly<br><a href="https://infosecwriteups.com/automate-your-recon-one-api-to-run-all-your-pentesting-tools-instantly-e1502862c2c7?source=rss------bug_bounty-5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosecwriteups.com/automate-y</span><span class="invisible">our-recon-one-api-to-run-all-your-pentesting-tools-instantly-e1502862c2c7?source=rss------bug_bounty-5</span></a></p><p><a href="https://kolektiva.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://kolektiva.social/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytips</span></a> <a href="https://kolektiva.social/tags/bugbountytip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountytip</span></a></p>
geeknik<p>Support ethical AI sabotage and open-source resistance. I build Gödel’s Therapy Room to expose LLM failure modes, develop browser tools to kill trackers, and train cognitive adversaries to detect bullshit.<br>Buy me a coffee and join the quantum rebellion.<br>☕ <a href="https://www.buymeacoffee.com/geeknik" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">buymeacoffee.com/geeknik</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/AIethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIethics</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Phillip Wylie<p>After 18 years my @YouTube channel is on the brink of a milestone. This is not a big deal for most, but sharing and helping others has been a big focus for me the past 7 years. Growing my channel helps with that mission. Please subscribe. </p><p><a href="https://youtube.com/@phillipwylie" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/@phillipwylie</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offensivesecurity</span></a></p>
Konstantin :C_H:<p>CVE Crowd's Top 3 Vulnerabilities from June!</p><p>These stood out among the 528 CVEs actively discussed across the Fediverse.</p><p>For each CVE, I’ve included a standout post from the community.</p><p>Enjoy exploring! 👇</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CVECrowd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVECrowd</span></a></p>
ITSEC News<p>The AI Fix #57: AI is the best hacker in the USA, and self-learning AI - In episode 57 of The AI Fix, our hosts discover an AI “dream recorder”, Mark Zuckerberg t... <a href="https://grahamcluley.com/the-ai-fix-57/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/the-ai-fix-57</span><span class="invisible">/</span></a> <a href="https://schleuss.online/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificialintelligence</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://schleuss.online/tags/theaifix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>theaifix</span></a> <a href="https://schleuss.online/tags/chatgpt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatgpt</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podcast</span></a> <a href="https://schleuss.online/tags/openai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openai</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>
Konstantin :C_H:<p>I recently ran into an interesting discrepancy:</p><p>What you see below are 120-bit Session IDs, one printed as hex and one in the format of a <a href="https://infosec.exchange/tags/UUIDv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UUIDv4</span></a>.</p><p>After validating their randomness, I would classify the first as secure but raise concerns about the second.</p><p>Why?</p><p>Well, according to RFC 4122:</p><p>"Do not assume that UUIDs are hard to guess; they should not be used as security capabilities (identifiers whose mere possession grants access), for example."</p><p>And that's exactly what a session ID is: an identifier whose possession grants access. As such, UUIDs should not be used in such a case.</p><p>What do you think? Is this nitpicking? Or a valid security nuance?</p><p>Does the format in which data is displayed have an impact on its security?</p><p>I'd love to hear your thoughts.</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
Aircorridor<p>Master Katana Web Crawler</p><p>Next-gen spidering tool handles JavaScript &amp; modern web apps! </p><p>Discover hidden endpoints, crawl SPAs, execute JS &amp; find vulnerabilities traditional tools miss.<br><a href="https://hackers-arise.com/web-app-hacking-katana-a-next-generation-crawling-and-spidering-framework/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackers-arise.com/web-app-hack</span><span class="invisible">ing-katana-a-next-generation-crawling-and-spidering-framework/</span></a><br><a href="https://infosec.exchange/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/katana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>katana</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
Lauritz<p>Thank you very much to everyone who made the event possible! ❤️</p><p>Congrats to c1phy (<a href="https://hackerone.com/c1phy" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hackerone.com/c1phy</span><span class="invisible"></span></a>) for securing the well-deserved 1st place. 🥇</p><p>Join your local h1.community chapter to not miss opportunities like this!</p><p><a href="https://h1.community/chapters/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">h1.community/chapters/</span><span class="invisible"></span></a></p><p>Leaderboard: <a href="https://leaderboards.hackerone.live/germany-meetup-june-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">leaderboards.hackerone.live/ge</span><span class="invisible">rmany-meetup-june-2025</span></a></p><p><a href="https://ruhr.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://ruhr.social/tags/Meetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meetup</span></a> <a href="https://ruhr.social/tags/HackerOne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerOne</span></a></p>
Wen Bin :verified:<p>If you've ever wanted your own VPN server for privacy, bug bounty testing, or to change your IP address without relying on overpriced services - I've got a tutorial for you.</p><p>In this beginner-friendly walkthrough, I show how to:<br>🔐 Set up WireGuard on a DigitalOcean VPS<br>🛠️ Configuration file for both server and client<br>📶 Enable IP forwarding and firewall on the server<br>📲 Connect from macOS using a config file or from phone using QR code</p><p>The result? A fast, secure, self-hosted VPN — and full control over your traffic.</p><p>🎥 Watch here: <a href="https://www.youtube.com/watch?v=p2a7wdvtnwg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=p2a7wdvtnwg</span><span class="invisible"></span></a></p><p>Would love to hear if you've used WireGuard before - or what tools you prefer!</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://infosec.exchange/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/DigitalPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalPrivacy</span></a> <a href="https://infosec.exchange/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://infosec.exchange/tags/BeginnerTutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BeginnerTutorial</span></a> <a href="https://infosec.exchange/tags/DigitalOcean" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalOcean</span></a></p>
Starbeamrainbowlabs<p><span class="h-card" translate="no"><a href="https://social.wildeboer.net/@jwildeboer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jwildeboer</span></a></span> As someone who is also struggling with burnout for unrelated reasons but is also an open source maintainer, I do suggest that the current situation is not fair or equitable.</p><p>If we were talking about a commercial product there then it would be a different story, but we're talking about open source.</p><p>Software that people have written for free and out of love with zero contract to update.</p><p>It has been my experience that open source is just as much about people involved as it is about the software itself, and mental health is an important issue here.</p><p>I can't that I have the answers, but I can say that I have been on the receiving end of a few bug bounty requests in the manner described here and it was a thoroughly unpleasant experience - especially as the reporting party completely ignored my guidelines for reporting them and refused to even attempt a fix....</p><p><a href="https://fediscience.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fediscience.org/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://fediscience.org/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://fediscience.org/tags/Equity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Equity</span></a> <a href="https://fediscience.org/tags/MentalHealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MentalHealth</span></a> <a href="https://fediscience.org/tags/MentalHealthInOpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MentalHealthInOpenSource</span></a></p>
Alameen KarimMerali :verified:<p><a href="https://github.com/brotheralameen1/Discordforschool/security/advisories/GHSA-63xr-98vc-whx5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/brotheralameen1/Dis</span><span class="invisible">cordforschool/security/advisories/GHSA-63xr-98vc-whx5</span></a></p><p>Published Security Advisory for OneTrust SDK V6.33.0 Vulnerable to Prototype Pollution causing DoS in the system by editing Prototype Value. Currently, submitted this to MITRE CVE to request publication of my CVE to the National Vulnerability Database and awaiting their response. You can click the link above to learn more about the exploit.</p><p><a href="https://ioc.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://ioc.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://ioc.exchange/tags/prototype" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prototype</span></a> <a href="https://ioc.exchange/tags/pollution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pollution</span></a> <a href="https://ioc.exchange/tags/ethical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethical</span></a> <a href="https://ioc.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://ioc.exchange/tags/penetration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetration</span></a> <a href="https://ioc.exchange/tags/testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>testing</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://ioc.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersec</span></a> <a href="https://ioc.exchange/tags/bughunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bughunting</span></a> <a href="https://ioc.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> <a href="https://ioc.exchange/tags/bugbountyhunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbountyhunting</span></a> <a href="https://ioc.exchange/tags/bughunter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bughunter</span></a> <a href="https://ioc.exchange/tags/webapplication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapplication</span></a> <a href="https://ioc.exchange/tags/webapplicationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapplicationsecurity</span></a> <a href="https://ioc.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Nawaf Allohaibi<p>A researcher discovered a vulnerability that exposed phone numbers linked to Google accounts, which has since been fixed. Google awarded the researcher $5,000 for the discovery.</p><p> <a href="https://mastodon.social/tags/VulnerabilityDiscovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityDiscovery</span></a>, <a href="https://mastodon.social/tags/GoogleSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleSecurity</span></a>, <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a>, <a href="https://mastodon.social/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a>, <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a>, <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a>, <a href="https://mastodon.social/tags/ResearcherReward" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ResearcherReward</span></a>, <a href="https://mastodon.social/tags/GoogleAccounts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleAccounts</span></a>, <a href="https://mastodon.social/tags/SecurityPatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityPatch</span></a>, <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a></p>
Alexandre Dulaunoy<p>Something that’s been bothering me for years in the security world: why do researchers demand bug bounties for vulnerabilities in open source projects, when the very contributors maintaining and fixing those issues get nothing, just goodwill?</p><p>It feels deeply unfair. The burden falls on unpaid maintainers, yet bounty hunters get rewarded. If you want a paid bounty, maybe help fund the people who actually fix the mess too.</p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Baklava Monster<p>Out of arguments during a <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> payout dispute? ChatGPT is your friend!</p><p>➡️ hallucinate convincing circumstances</p><p>➡️ exagerate an irrelevant threat model</p><p>➡️ claim "industry best practice" without a source</p><p>(the last point was generated by an LLM)</p>