Login
Signup
November 25, 2025
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Bug Bounty
Bypassing Web Application Firewalls (WAFs): A Beginner’s Guide
Bikash Sharma
November 29, 2024
Bug Bounty
The Hidden Risks of Open-Sourcing Tools: What Every Organization Must Know
Bikash Sharma
November 22, 2024
Bug Bounty
Understanding Broken Access Control Vulnerability: A Comprehensive Guide
Bikash Sharma
November 21, 2024
Bug Bounty
The Hidden Costs of Not Running a Bug Bounty Program
Bikash Sharma
November 14, 2024
Bug Bounty
Tips & Trick
Understanding SSRF: A Deep Dive into Server-Side Request Forgery
Bikash Sharma
November 11, 2024
Bug Bounty
Events
Empowering Future Cybersecurity Experts: Bugv’s Awareness Program at Samarpan Academy
Bikash Sharma
October 31, 2024
Bug Bounty
Life of an Ethical Hacker: The Hidden Realities Behind the Screen
Bikash Sharma
October 24, 2024
Bug Bounty
Prioritizing Bug Fixing Over Adding New Features
Bikash Sharma
October 23, 2024
Bug Bounty
Events
Bugv’s Cybersecurity Awareness Program at Divya Gyan College
Bikash Sharma
October 22, 2024
Bug Bounty
Tips & Trick
5 Traits of Highly Effective Hackers
Bikash Sharma
October 16, 2024
1
2
3
4
5
…
10
Bug Bounty
69
Ethical Hacking
1
Events
12
Hacker Spotlight
5
Recent Posts
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025