Login
Signup
December 7, 2025
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
Home
Bug Bounty
Program Launch
Hacker Spotlight
Events
About
Contact
bugv
Tips & Trick
What Is a Bug Bounty and How It Works
Jeeya Maharajan
December 5, 2025
Tips & Trick
Why You Need Responsible Disclosure and How to Get Started
Jeeya Maharajan
December 4, 2025
Ethical Hacking
White Hat Hacker vs. Blue Hat Hacker vs. Black Hat Hacker
Jeeya Maharajan
November 28, 2025
pentesting
What Is Penetration Testing as a Service (PTaaS)?
Jeeya Maharajan
November 21, 2025
pentesting
Pentesting Tools You Must Know About
Jeeya Maharajan
November 14, 2025
Tips & Trick
Cyber Safety Checklist: Things You Should Do Before Every Weekend
Jeeya Maharajan
October 31, 2025
Bug Bounty
pentesting
VDP
The Power of Crowdsourced Security Testing
Bikash Sharma
September 4, 2024
Bug Bounty
pentesting
Tips & Trick
The Most Common SQL Injection Attacks
Bikash Sharma
July 16, 2024
Bug Bounty
Events
pentesting
Why Your Business Needs to Run a Bug Bounty Program with Bugv
Bikash Sharma
July 3, 2024
Events
News
Empowering Women in Cybersecurity: WIIT and Bugv Successfully Host Hackathon
Bikash Sharma
June 16, 2024
1
2
3
…
5
Bug Bounty
68
Ethical Hacking
1
Events
12
Hacker Spotlight
5
Recent Posts
Bug Bounty
Pay a Reward, Now a Ransom: The Shifting Landscape of Cyber Extortion
Bikash Sharma
February 24, 2025
Bug Bounty
Understanding XML External Entities (XXE) Vulnerabilities
Bikash Sharma
February 21, 2025
Bug Bounty
Cache Poisoning: A Silent Threat to Web Security
Bikash Sharma
February 13, 2025
Bug Bounty
Bypassing Authentication: Common Tricks Used in Bug Bounty
Bikash Sharma
February 5, 2025