In the past year we’ve seen the Bugcrowd community more than double to more than 60,000 researchers, up from 26,782 at the beginning of 2016. With this growth comes the increasing responsibility to educate and foster the professional growth that our researchers seek every day.
Bugcrowd is excited to announce our June 2017 Hall of Fame winners!
At the top, mongo is in our first place spot again :), with Web_Plus following closely behind in second and ahmedehane rounding out our top three! To thank our top performers for their hard work, Bugcrowd is pleased to announce that all three researchers have received bonuses for their performance in the month of June.
- mongo - 844 points - $2,500 bonus
- Web_Plus - 813 points - $1,500 bonus
- ahmedehane - 602 points - $1,000 bonus
This post original ran on the (ISC)² blog on June 1, 2017:
Since 2013, (ISC)² has been a partner of Bugcrowd, running a public bug bounty program and offering CPE credits to our members. Bugcrowd is a leading provider of crowdsourced security and bug bounty programs, connecting organizations with more than 50,000 independent security researchers to identify vulnerabilities. As an (ISC)² member, you can participate in Bugcrowd’s bug bounty programs in exchange for CPE credits.
We encourage you to participate in this program to continue honing your security skills, and to apply those skills to help inspire a safe and secure cyber world.
- Sign up as a Bugcrowd researcher at bugcrowd.com
- Find a bug in one of Bugcrowd’s bug bounty programs, including the (ISC)² Bug Bounty Program
- Earn up to 5 CPE credits for each valid bug found, depending on the severity of the vulnerability
- Enter your ISC2 # into your Bugcrowd Researcher profile settings, so that Bugcrowd can submit your contributions at the end of the month.
Members who participate in the program can earn as many as 15 CPE credits each year. As a security-centric organization, Bugcrowd values and encourages independent security research, even on their own products. Their bug bounty program helps them connect with the research community, and provides their organization with constant security feedback.
Keep your skills sharp and keep our site – and others – secure with the bug bounty program.
For the last
Learn more about the promotion here.
Fridays have long been a day to look forward to for Bugcrowd researchers; now researchers can look forward to getting paid on Wednesdays! 🐫
This is the fifth post in our series: "Bug Bounty Hunter Methodology". Read on to learn how you can use bug bounties to build and grow a successful penetration testing or bug hunting career. If you have any feedback, please tweet us at @Bugcrowd.
This is the fourth post in our series: "Bug Bounty Hunter Methodology". Today's is a guest post from Scott Robinson, @sd_robs on Twitter and SRobin on Bugcrowd. Read on to learn how to write a successful bug submission. If you have any feedback, please tweet us at @Bugcrowd.
This is the third post in our series: "Bug Bounty Hunter Methodology". Today's is a guest post from ZephrFish, whom you can follow on twitter at @ZephrFish. Read on to learn how to use notes and session tracking to make your bug bounty hunting more successful. If you have any feedback, please tweet us at @Bugcrowd.
This is the second post in our new series: "Bug Bounty Hunter Methodology". Today we explore bounty scopes, disclosure terms & rules, and how those guide you in your hacking. If you have any feedback, please tweet us at @Bugcrowd.
This is the first post in our new series: "Bug Bounty Hunter Methodology". Over the coming weeks, we will share information and resources that will help any aspiring security researcher or bug bounty hunter get their start. If you have any feedback, please tweet us at @Bugcrowd.