Login
Signup
December 15, 2025
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Bikash Sharma
40 Articles Written
4 Comments
Bug Bounty
How Bugv Is Making Cybersecurity Accessible for Everyone
Bikash Sharma
December 12, 2025
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025
Bug Bounty
Top 5 Reasons Companies Need a Vulnerability Disclosure Program (VDP)
Bikash Sharma
February 4, 2025
Bug Bounty
Tips & Trick
AI and Cybersecurity: How Attackers and Defenders are Using AI
Bikash Sharma
January 30, 2025
Bug Bounty
Top 10 Web Application Vulnerabilities of the Past 5 Years: Trends and Insights
Bikash Sharma
January 28, 2025
Bug Bounty
Types of Web Application Injection Attacks: A Detailed Overview
Bikash Sharma
January 8, 2025
Bug Bounty
pentesting
How Bug Bounty Programs Reveal More Vulnerabilities Than Traditional Penetration Testing
Bikash Sharma
December 30, 2024
1
2
3
4
Bug Bounty
69
Ethical Hacking
1
Events
12
Hacker Spotlight
5
Recent Posts
Bug Bounty
How Bugv Is Making Cybersecurity Accessible for Everyone
Bikash Sharma
December 12, 2025
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025