Login
Signup
January 5, 2026
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Bikash Sharma
40 Articles Written
4 Comments
Bug Bounty
How Bugv Is Making Cybersecurity Accessible for Everyone
Bikash Sharma
December 12, 2025
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025
Bug Bounty
Top 5 Reasons Companies Need a Vulnerability Disclosure Program (VDP)
Bikash Sharma
February 4, 2025
Bug Bounty
Tips & Trick
AI and Cybersecurity: How Attackers and Defenders are Using AI
Bikash Sharma
January 30, 2025
Bug Bounty
Top 10 Web Application Vulnerabilities of the Past 5 Years: Trends and Insights
Bikash Sharma
January 28, 2025
Bug Bounty
Types of Web Application Injection Attacks: A Detailed Overview
Bikash Sharma
January 8, 2025
Bug Bounty
pentesting
How Bug Bounty Programs Reveal More Vulnerabilities Than Traditional Penetration Testing
Bikash Sharma
December 30, 2024
1
2
3
4
Bug Bounty
73
Ethical Hacking
1
Events
13
Hacker Spotlight
5
Recent Posts
Bug Bounty
The True Cost of Ignoring Cybersecurity in 2025
Jeeya Maharajan
December 31, 2025
Bug Bounty
pentesting
Bug Bounty vs Penetration Testing: Which Is Best for Your Company?
Jeeya Maharajan
December 30, 2025
Bug Bounty
Why Every Startup in Nepal Needs a Bug Bounty Program
Jeeya Maharajan
December 29, 2025
Bug Bounty
How to Start Bug Bounty Hunting in Nepal: A Step-by-Step Guide
Jeeya Maharajan
December 26, 2025