BugGyaan
December 9th 2022
PRIVATE VS PUBLIC BUG BOUNTY PROGRAM
Many websites and software developers provide bug bounty programmes in which users can gain notoriety and cash for reporting bugs, particularly those ...
Featured Blogs
MYTHS SURROUNDING CONTINUOUS TESTING
Continuous security testing is carried out to verify the security flaws that underlie your IT infrastructure and web applications. This is a technique...
Defining scopes for bug bounty programs
The first step in creating your programme brief, which you should undertake if you’ve decided that you and your business are willing to invest the nec...
An Integrated Guide to Vulnerability Management
Vulnerability management is the continuous, systematic process of finding, analyzing, reporting on, managing, and addressing cyber vulnerabilities acr...
Defining Cyber Attack Liability
The risks of cyber liability are evolving rapidly, with new risks emerging as technology advances and new regulations are put in place. Therefore, it...
How to Defend Against Threats to Critical Infrastructure
Cybersecurity breaches in critical infrastructure networks are increasing - appearing frequently in recent headlines. Critical infrastructure involv...
BugBase raises US$500,000 in pre-seed funding
100X.VC-backed Cybersecurity marketplace by two college dropouts, BugBase raises US$500,000 in funding led by 2am VC
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
MYTHS SURROUNDING CONTINUOUS TESTING
Continuous security testing is carried out to verify the security flaws that underlie your IT infrastructure and web applications. This is a technique...
Defining scopes for bug bounty programs
The first step in creating your programme brief, which you should undertake if you’ve decided that you and your business are willing to invest the nec...
An Integrated Guide to Vulnerability Management
Vulnerability management is the continuous, systematic process of finding, analyzing, reporting on, managing, and addressing cyber vulnerabilities acr...
Defining Cyber Attack Liability
The risks of cyber liability are evolving rapidly, with new risks emerging as technology advances and new regulations are put in place. Therefore, it...
How to Defend Against Threats to Critical Infrastructure
Cybersecurity breaches in critical infrastructure networks are increasing - appearing frequently in recent headlines. Critical infrastructure involv...
BugBase raises US$500,000 in pre-seed funding
100X.VC-backed Cybersecurity marketplace by two college dropouts, BugBase raises US$500,000 in funding led by 2am VC
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
MYTHS SURROUNDING CONTINUOUS TESTING
Continuous security testing is carried out to verify the security flaws that underlie your IT infrastructure and web applications. This is a technique...
Defining scopes for bug bounty programs
The first step in creating your programme brief, which you should undertake if you’ve decided that you and your business are willing to invest the nec...
An Integrated Guide to Vulnerability Management
Vulnerability management is the continuous, systematic process of finding, analyzing, reporting on, managing, and addressing cyber vulnerabilities acr...
Defining Cyber Attack Liability
The risks of cyber liability are evolving rapidly, with new risks emerging as technology advances and new regulations are put in place. Therefore, it...
How to Defend Against Threats to Critical Infrastructure
Cybersecurity breaches in critical infrastructure networks are increasing - appearing frequently in recent headlines. Critical infrastructure involv...
BugBase raises US$500,000 in pre-seed funding
100X.VC-backed Cybersecurity marketplace by two college dropouts, BugBase raises US$500,000 in funding led by 2am VC
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.

Let's take your security
to the next level

security