Login
Signup
March 10, 2026
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Bikash Sharma
40 Articles Written
4 Comments
Bug Bounty
How Bugv Is Making Cybersecurity Accessible for Everyone
Bikash Sharma
December 12, 2025
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025
Bug Bounty
Top 5 Reasons Companies Need a Vulnerability Disclosure Program (VDP)
Bikash Sharma
February 4, 2025
Bug Bounty
Tips & Trick
AI and Cybersecurity: How Attackers and Defenders are Using AI
Bikash Sharma
January 30, 2025
Bug Bounty
Top 10 Web Application Vulnerabilities of the Past 5 Years: Trends and Insights
Bikash Sharma
January 28, 2025
Bug Bounty
Types of Web Application Injection Attacks: A Detailed Overview
Bikash Sharma
January 8, 2025
Bug Bounty
pentesting
How Bug Bounty Programs Reveal More Vulnerabilities Than Traditional Penetration Testing
Bikash Sharma
December 30, 2024
1
2
3
4
Bug Bounty
78
Ethical Hacking
1
Events
14
Hacker Spotlight
7
Recent Posts
Bug Bounty
Hacker Spotlight
Hacker Spotlight: Anushka Shrestha: @anushka221
Bugv Admin
March 8, 2026
Bug Bounty
Why Skill-Based Security Validation Matters More Than Certifications
Bugv Admin
March 3, 2026
Bug Bounty
Web vs Mobile Bug Hunting: What Hackers Need to Know in 2026
Bugv Admin
February 18, 2026
Bug Bounty
From CVE Knowledge to Real Exploits: What Bug Bounty Platforms Really Test
Bugv Admin
February 11, 2026