Login
Signup
March 20, 2025
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Bikash Sharma
40 Articles Written
4 Comments
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025
Bug Bounty
Top 5 Reasons Companies Need a Vulnerability Disclosure Program (VDP)
Bikash Sharma
February 4, 2025
Bug Bounty
Tips & Trick
AI and Cybersecurity: How Attackers and Defenders are Using AI
Bikash Sharma
January 30, 2025
Bug Bounty
Top 10 Web Application Vulnerabilities of the Past 5 Years: Trends and Insights
Bikash Sharma
January 28, 2025
Bug Bounty
Types of Web Application Injection Attacks: A Detailed Overview
Bikash Sharma
January 8, 2025
Bug Bounty
pentesting
How Bug Bounty Programs Reveal More Vulnerabilities Than Traditional Penetration Testing
Bikash Sharma
December 30, 2024
Bug Bounty
Cybersecurity Awareness Month 2024: Empowering Digital Safety for All
Bikash Sharma
December 27, 2024
1
2
3
4
Bug Bounty
69
Events
12
Hacker Spotlight
5
News
24
Recent Posts
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025